US7568101B1 - Digital signatures with an embedded view - Google Patents

Digital signatures with an embedded view Download PDF

Info

Publication number
US7568101B1
US7568101B1 US10/846,428 US84642804A US7568101B1 US 7568101 B1 US7568101 B1 US 7568101B1 US 84642804 A US84642804 A US 84642804A US 7568101 B1 US7568101 B1 US 7568101B1
Authority
US
United States
Prior art keywords
signed data
digital signature
data
embedded
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US10/846,428
Inventor
Alessandro Catorcini
Arungundram Narendran
Danny van Velzen
Mihaela C. Cris
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Priority to US10/846,428 priority Critical patent/US7568101B1/en
Assigned to MICROSOFT CORPORATION reassignment MICROSOFT CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: NARENDRAN, ARUNGUNDRAM, CATORCINI, ALESSANDRO, CRIS, MIHAELA C., VAN VELZEN, DANNY
Priority to US10/876,418 priority patent/US7533268B1/en
Application granted granted Critical
Publication of US7568101B1 publication Critical patent/US7568101B1/en
Assigned to MICROSOFT TECHNOLOGY LICENSING, LLC reassignment MICROSOFT TECHNOLOGY LICENSING, LLC ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: MICROSOFT CORPORATION
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/68Special signature format, e.g. XML format

Definitions

  • This invention relates to digital signature methods and systems.
  • Digital signatures are valid substitutes to traditional inked signatures in many countries. Digital signatures, like inked signatures, may be used as evidence to show that a particular body of data was signed.
  • Typical digital signatures allow a signer to electronically sign data and be reasonably certain that the data will not change. Thus, data having a digital signature is locked; it cannot be altered without invalidating the digital signature. Because of this, a digital signature can be used as evidence to show that the data locked by the digital signature was signed and has not been altered since it was signed.
  • Some other types of digital signatures preserve the view of the data when it was signed using a link to the view at a remote website.
  • the data of the digital signature can be presented in other ways after the data is signed, but the view seen by the signer is preserved, at least initially, through this remote website.
  • the view stored in the remote website may not be valid or exist when the digital signature is later used as evidence. In many real-world situations, a digital signature may need to be used as evidence ten, twenty, or even thirty years from when it was signed. The view initially preserved at the remote website may not exist then. Second, the view, even if it exists, may not be readily available, such as when the remote website cannot be readily accessed.
  • Another type of digital signature partially addresses this drawback but it suffers from another problem.
  • This type of digital signature combines the view of the data when signed and the data itself. But combining the data and the view prevents the data from being read by a machine. Because the data is not machine readable, it cannot be repurposed, which significantly limits the usefulness of this type of digital signature.
  • a digital signature and related methods and systems providing an embedded view of signed and repurposable data is described. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation.
  • a digital signature can also include embedded information sufficient to recreate the embedded view using the signed data. This information provides a check on the embedded view to further secure the digital signature.
  • FIG. 1 illustrates an exemplary architecture having an exemplary electronic document and signing application.
  • FIG. 2 sets forth a flow diagram of an exemplary process for creating digital signatures in part by interacting with a potential signer.
  • FIG. 3 illustrates a screen shot showing part of a signable data section of the electronic document.
  • FIG. 4 illustrates an exemplary certification dialog box.
  • FIG. 5 illustrates an exemplary comment dialog box.
  • FIG. 6 illustrates an exemplary signing overview dialog box showing exemplary information that can be embedded into a digital signature.
  • FIG. 7 illustrates a screen shot showing part of a signable data section that has been signed.
  • FIG. 8 sets forth a flow diagram of an exemplary process for building digital signatures.
  • FIG. 9 illustrates an exemplary electronic document, signature blocks, and digital signature.
  • Digital signatures and related methods and systems described below can provide an embedded view of data when signed that locks the signed data and permits it to be repurposed. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation.
  • An embedded view makes a digital signature more secure by capturing the context that lead to the decision to sign, without having to rely on a potentially unreliable or unavailable view.
  • This embedded view captures how data is presented when a signer makes a decision to sign. By seeing data in a particular way, a signer makes a decision to sign or not sign. Because this embedded view shows how the data was presented to the signer at signing and the context in which the data is shown, this embedded view can be important in establishing what the signer intended to sign.
  • These digital signatures may also include other embedded information that further secures the digital signature.
  • Information sufficient to recreate the computer environment with which the embedded view was viewed, for instance, may be embedded to provide additional context for the embedded view. With this information (called “meta information”), a court of law can determine what computer environment is needed to recreate what a signer viewed at signing. The court can then recreate what the signer viewed by presenting the embedded view with this computer environment.
  • an exemplary architecture 100 is shown having an electronic document 102 and signing application 104 accessible by a computer 106 .
  • This architecture 100 and its components are shown to aid in discussing, but are not intended to limit the applicability of, the digital signatures and their related methods.
  • the electronic document 102 is hierarchically structured and written using a tag-based language.
  • this language comprises eXtensible Markup Language (XML), though other structures and languages may be used. It is shown divided into signable data sections 102 a , 102 b, 102 c, and 102 d, each of which relates to various signature blocks 108 , 110 , 112 , and 114 , these relationships shown with dashed lines. These signature blocks are as yet unsigned, but are shown related to those data sections that they can lock once signed. These signature blocks can be structured to conform to the XML Signatures standard currently prescribed by the World Wide Web Consortium (W3C).
  • W3C World Wide Web Consortium
  • the signing application 104 comprises a user interface 116 (though this user interface 116 can be separate from the signing application 104 ), which can be used to aid a potential signer in signing a digital signature.
  • FIG. 2 an exemplary process 200 for creating digital signatures is shown.
  • the process 200 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104 and the user interface 116 .
  • This and other processes described herein may be implemented in any suitable hardware, software, firmware, or combination thereof. In the case of software and firmware, these processes represent sets of operations implemented as computer-executable instructions.
  • an electronic document capable of being signed is presented to a potential signer.
  • the user interface 116 presents the electronic document 102 and enables selection of data sections 102 a, 102 b , 102 c, and 102 d for signing.
  • the user interface 116 can present the electronic document 102 by transforming the XML into viewable HTML (Hyper Text Machine Language) using an XSLT (eXtensible Stylesheet Language Transformation) file or other suitable technique.
  • a screen shot 300 showing a portion 302 of the electronic document 102 is shown.
  • This portion 302 shows a view of part of the signable data section 102 a of the electronic document 102 and a selector 304 by which a user can select to sign this data section 102 a.
  • the user can select to sign just the data section 102 a, just the data section 102 b, both the data sections 102 b and 102 c at once, or all of the data sections at once.
  • This array of choices is enabled in this embodiment by the signature blocks 108 , 110 , 112 , and 114 .
  • the user selects to sign just the data section 102 a.
  • an intention to sign the presented electronic document or its data section is received.
  • the user interface 116 receives a selection of the data section 102 a.
  • a way in which the presented electronic document or its data section can be signed is determined.
  • the signing application 104 determines in which way the selected section can be signed by analyzing the signature block 108 .
  • the signature block 108 can set forth that this data section 102 a can be signed by only one person, by multiple persons as co-signers, or by multiple persons as counter-signers. It can also set forth that this data section 102 a permits a digital signature having meta information, comments, and custom data, for instance.
  • the signing application 104 directs the user interface 116 according to the ways in which the selected section can be signed. In this embodiment, the user interface 116 follows blocks 208 , 210 and 216 based on this direction from the signing application 104 .
  • a signer's identity is selected and received.
  • the user interface 116 enables selection of and receives the identity of the signer.
  • the signer's identity can be represented by a private key in a infrastructure (PKI) certification or another suitable technique.
  • PKI infrastructure
  • a person selecting a signer's identity can be different from that person's own identity.
  • a person selecting the signer's identity can be acting as an agent for the signer, such as an assistant acting as an agent for his or her boss.
  • a dialog box for certificate selection 400 presented by the user interface 116 is shown.
  • the signer chooses a way by which his or her identity is certified.
  • comments and/or custom information are enabled and received.
  • the user interface 116 enables the user to add comments. Comments or custom information can be received from sources other than the user, which will be described in greater detail below.
  • a comment dialog box 500 presented by the user interface 116 is shown.
  • the signer adds comments, if desired. Comments can help aid in analyzing a digital signature by adding context or otherwise setting the expressed intent of the signer. In this case, the signer simply comments that he approves of the applicant by his signature. In other cases, a signer might comment that he or she has reservations about some particular aspect of a document or data section he or she is signing.
  • the user interface 116 can also present custom information options to the user (not shown), such as selecting a time stamp from a website, determining a location of the user with a global position device, and the like. This custom information can also be embedded in the digital signature to further secure and provide context for the digital signature.
  • information sufficient to recreate the view currently seen of the data intended to be signed is determined.
  • the signing application 104 determines what computer environment is necessary to recreate the view of the data section 102 a currently presented to the potential signer. This environment is described with information about the computer's software and/or hardware and is called “meta information”. Using this meta information, a view embedded in the digital signature can later be verified by recreating that view from the data with the described computer environment.
  • the signing application 104 compiles the information that will be built into the digital signature if the user signs the data section 102 a.
  • the signing application 104 compiles information received by the user interface 116 , such as comments from the signer and the signer's identity.
  • the signing application 104 also compiles other information, such as the meta information, in some cases custom information, and/or a static image of the view currently seen by the user.
  • information that can be embedded into or locked by the digital signature is presented and the signature enabled and received.
  • the user interface 116 presents information that will be embedded into and locked by the digital signature if the user signs the data section 102 a.
  • the information comprises the user's PKI certification, the meta information, the comments, and the static image of the view of the data section 102 a and the other information shown at the moment signed.
  • the static image can comprise data and information other than that which is signed so long as what is and is not signed in the static view can be differentiated.
  • the static image comprises just the data signed, here the data section 102 a.
  • the static image comprises additional data, such as all the data of the electronic document 102 .
  • information that can be embedded in the digital signature, should the user sign is presented by the user interface 116 using a signing overview dialog box 600 .
  • the user interface 116 presents the comment at 602 , the meta information at 604 , and the static image at 606 .
  • the user can choose to sign the digital signature by selecting a sign button 608 .
  • the user can choose to view the certificate by selecting a view certificate button 610 .
  • the user can select a confirmation checkbox 612 , thereby recording that the user has verified the content of the overview dialog box 600 prior to signing.
  • the user interface 116 enables the user to check over the presented information, verify the content, and sign the digital signature.
  • a digital signature with an embedded view of the data at signing that locks the signed data but permits the signed data to be repurposed is built.
  • the signing application 104 builds the digital signature by embedding the information into the digital signature that was presented to the signer with the signature overview dialog box 600 .
  • This digital signature comprises an embedded, static image 606 of the view of the data section 102 a that the signer viewed and selected to sign.
  • This static image 606 secures the digital signature by showing in what way and to what extent the data section 102 a was presented to the signer.
  • the static image 606 does not show all of the data section 102 a. In this case the static image 606 shows the view presented to the signer of the data section 102 a, though this view can show less than all of the data of the data section 102 a.
  • the digital signature comprises meta information 604 sufficient to recreate the computer environment by which the signer viewed the data section 102 a.
  • This meta information 604 provides an additional check, or a stand-alone check if no static image is embedded, on the view of the data section 102 a seen by the signer.
  • the digital signature comprises the comment 602 added by the signer.
  • This comment 602 further secures and/or provide context for the signer's choice to sign the data section 102 a.
  • the signed electronic document and/or data section is presented.
  • the user interface 116 presents the electronic document 102 showing the data section 102 a as signed and by whom.
  • the data section 102 a is locked by the digital signature, and the electronic document 102 and the data section 102 a are repurposable.
  • all of the other data of the electronic document 102 (the data 102 b, 102 c, and 102 d ) can be changed without breaking the digital signature on the data section 102 a, while the data section 102 a can be repurposed but not changed.
  • other people can view and change the electronic document 102 except for the data section 102 a.
  • this embodiment of the digital signature enables efficient reviewing and signing.
  • a later signer of all of the data sections of the electronic document 102 knows that if the data section 102 a is signed, that he or she is signing data that is identical to that which was previously signed. In some cases this is very important. For example, a CEO of a company may need to sign all of a document, but before doing so wants to know if what he is signing has already been signed by other appropriate persons. If data section 102 a is related to safety standards, the CEO may want to know that the head engineer of the company has signed this data section 102 a before the CEO signs the entire electronic document 102 .
  • the CEO also may want to be sure that the data section 102 a has not changed since it was signed.
  • the CEO can be sure that the data signed by the head engineer has been signed and has not changed. Because this digital signature permits signed data to be read by machines, and thus be repurposed, the CEO can view the data section 102 a as seen by the engineer at signing, or repurpose the data section 102 a to see it in another view.
  • the CEO signs the whole document (here following the signature block 114 ) he can be signing data that has previously been signed (the data section 102 a ) and data that has not (e.g., the data section 102 d ).
  • the user interface 116 presents a view 700 of the data section 102 a of the electronic document 102 .
  • the data section 102 a is shown with an indication that it has been signed with text and an icon, shown at 702 .
  • Data within the data section 102 a is locked; thus, the comments and hiring recommendation shown at 704 and 706 cannot be changed without breaking the signature shown at 702 .
  • Each signature block can permit a single signature, co-signatures, or counter-signatures for each data section to which it pertains.
  • another signature of the data section 102 a is not permitted by the signature block 108 , and so a choice to add another signature is not enabled at this location.
  • a signature can be enabled of all of the electronic document 102 , the data section 102 b, or the data sections 102 b and 102 c at once, as prescribed by the signature blocks 110 , 112 , and 114 .
  • FIG. 8 an exemplary process 800 for building digital signatures is shown.
  • This process 800 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104 .
  • This process 800 is an exemplary implementation of the block 218 of FIG. 2 , though this process 800 can be implemented separately as a stand-alone process or otherwise not implemented as part of the process 200 .
  • the signing application 104 builds a digital signature in part by embedding information into a signature block and then locking the embedded information. In other embodiments, however, information is embedded directly into a digital signature without first embedding it into a signature block. In still others, information is embedded into a signature block and locked, but other parts of the signature block are not locked and so remain changeable.
  • the signing application 104 can embed information into a digital signature by embedding the information into a signature block.
  • the signature block can then be locked, thereby creating a digital signature comprising the information embedded into the signature block.
  • the signing application 104 embeds the view of the signed data into the digital signature.
  • the signing application 104 embeds information into one of the signature blocks 108 , 110 , 112 , and 114 and then locks the embedded information.
  • the data signed is the data to which the signature block pertains.
  • the signature blocks 108 , 110 , 112 , and 114 comprise XML selector (e.g., and XPath expression) indicating the data of the electronic document 102 on which a signature can be made.
  • the signature block 108 indicates the data section 102 a as signable.
  • the signature block 114 indicates the data sections 102 a, 102 b, 102 c, and 102 d as signable together.
  • These signature blocks can indicate what part is signable through the tree or subtree for the data section 102 a of the hierarchically structured electronic document 102 .
  • the view embedded by the signing application 104 can comprise a static image seen by the signer at signing.
  • the signing application 104 embeds the static image 606 into the signature block 108 as a portable network graphic (PNG) file.
  • PNG portable network graphic
  • an exemplary digital signature 902 is shown. This digital signature 902 is based on the ongoing example using the signature block 108 of FIG. 1 .
  • the digital signature 902 comprises the signature block 108 , embedded information, and a locking element.
  • the signing application 104 embeds the static image 606 within the digital signature 902 as a PNG file of an embedded static image 904 .
  • the signing application 104 embeds meta information sufficient to recreate the embedded view from the signed data.
  • This meta information comprises specifications of the computer environment used by the signer to view the signed data, such as system date, time, and time-zone, the versions of the operating system and the signing application 104 , system data (e.g., type of processor), number of monitors, type of monitors, type and/or version of image application that rendered the view, and/or the like.
  • an embedded meta information 906 is shown.
  • the embedded meta information 906 comprises the meta information 604 : “System date/time: Friday, Jan. 16, 2004 4:02”; “Windows version: 5.1.2600”; “Office version: 11.0.5870”; “InfoPath version: 11.0.5924”; and “Number of monitors: 1.”
  • the signing application 104 embeds into the digital signature information sufficient to indicate the identity of the signer.
  • an embedded signer identity 908 is shown.
  • the embedded identity 906 comprises a PKI certification issued by MicrosoftTM and shown in FIG. 5 .
  • the signing application 104 embeds a comment into the digital signature.
  • embedded comment information 910 is shown.
  • the embedded comment 910 comprises the text “I approve” of the comment 602 of FIG. 6 .
  • the signing application 104 can embed custom information into the digital signature.
  • This custom information can be received from the signer or another source.
  • the signing application 104 can, for instance, receive custom information from remote locations (such as a time-stamp from a government or other reliable website), a GPS (Global Positioning Satellite) device, and the like.
  • This custom information can be added to the digital signature 902 using custom user code (e.g., script) or other manners for extending the signature block 108 and/or the digital signature 902 .
  • embedded custom information 912 is shown.
  • the embedded custom information 912 comprises a GPS-determined physical location of the signer's computer (the computer 106 ) at signing.
  • the signing application 104 embeds information indicating what data is signed into the digital signature.
  • this information is a transformation indicating the data signed, such as by pointing to part or all of an electronic document. This transformation can indicate a particular subtree or subtrees of a structured electronic document to which the digital signature pertains.
  • an embedded data indicator 914 is shown.
  • the data indicator 914 is part of the signature block 108 .
  • the signing application 104 embeds the data indicator 914 into the digital signature 902 .
  • the signing application 104 locks the digital signature.
  • the signing application 104 can lock the digital signature by computing a strong cryptographic hash over the signed data and the embedded information, or with another suitable technique.
  • the signing application 104 can also embed the strong cryptographic hash within the digital signature.
  • the signing application 104 computes a strong cryptographic hash over the information embedded within the signature block 108 , such as the static image 904 , the meta information 906 , the signer identity 908 , the comment information 910 , the custom information 912 , and/or the data indicator 914 , and the signed data (indicated by the indicator 914 ).
  • This strong cryptographic hash is added to the digital signature 902 and locks the embedded information of the digital signature 902 and the signed data (here the data section 102 a ). If any of the information or the signed data is changed, the strong cryptographic hash of the digital signature 902 will not match with a new hash computed over the changed information and/or signed data.
  • the digital signature 902 will be deemed invalid if these are changed.
  • the strong cryptographic hash does not, however, prevent the embedded information from being viewed by persons. It also does not prevent the signed data from being read by a machine. Because the signed data can be read by a machine, it can also be repurposed without breaking the digital signature 902 .
  • a signature lock 916 is shown in the digital signature 902 .
  • the digital signature lock 916 comprises the strong cryptographic hash described above.
  • the digital signature 902 is shown as the signature block 108 with embedded information and locked with a strong cryptographic hash. In other embodiments, however, a digital signature can be built without use of a signature block. In these cases the signing application 104 collects the information, determines the data that is intended to be signed, embeds the information into a digital signature and locks the information and the data.

Abstract

Digital signatures having an embedded view of signed data that lock the signed data but permit it to be repurposed are described. One of these digital signatures can be repurposed for signature by others, such as co-signers or counter-signers. Another of these digital signatures includes embedded information sufficient to recreate the embedded view using the signed data. A method for building a digital signature is also described that permits signing different parts of an electronic document.

Description

TECHNICAL FIELD
This invention relates to digital signature methods and systems.
BACKGROUND
Digital signatures are valid substitutes to traditional inked signatures in many countries. Digital signatures, like inked signatures, may be used as evidence to show that a particular body of data was signed.
Typical digital signatures allow a signer to electronically sign data and be reasonably certain that the data will not change. Thus, data having a digital signature is locked; it cannot be altered without invalidating the digital signature. Because of this, a digital signature can be used as evidence to show that the data locked by the digital signature was signed and has not been altered since it was signed.
While the data may not change since it was signed, how the data is presented can change with some types of electronic documents. Data presented in one way may be substantially different to the viewer than when presented in another. Important data can be shown with a large font that is easily seen in one presentation, for instance, but in another be shown in a small-font footnote.
This can be a significant problem for types of digital signatures that do not preserve the view of the data when signed. These types of digital signatures will not show how the data was presented when signed, making them less reliable evidence. Thus, while digital signatures typically lock the data that is signed, some types of digital signatures do not lock or preserve the view of the data when it was signed.
Some other types of digital signatures, however, preserve the view of the data when it was signed using a link to the view at a remote website. Here the data of the digital signature can be presented in other ways after the data is signed, but the view seen by the signer is preserved, at least initially, through this remote website.
These digital signatures suffer from significant drawbacks. First, the view stored in the remote website may not be valid or exist when the digital signature is later used as evidence. In many real-world situations, a digital signature may need to be used as evidence ten, twenty, or even thirty years from when it was signed. The view initially preserved at the remote website may not exist then. Second, the view, even if it exists, may not be readily available, such as when the remote website cannot be readily accessed.
Another type of digital signature partially addresses this drawback but it suffers from another problem. This type of digital signature combines the view of the data when signed and the data itself. But combining the data and the view prevents the data from being read by a machine. Because the data is not machine readable, it cannot be repurposed, which significantly limits the usefulness of this type of digital signature.
Given the foregoing, there is a need in the art for a digital signature that can permit signed data to be repurposed and that can also include the view when signed.
SUMMARY
A digital signature and related methods and systems providing an embedded view of signed and repurposable data is described. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation.
A digital signature, as disclosed herein, can also include embedded information sufficient to recreate the embedded view using the signed data. This information provides a check on the embedded view to further secure the digital signature.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates an exemplary architecture having an exemplary electronic document and signing application.
FIG. 2 sets forth a flow diagram of an exemplary process for creating digital signatures in part by interacting with a potential signer.
FIG. 3 illustrates a screen shot showing part of a signable data section of the electronic document.
FIG. 4 illustrates an exemplary certification dialog box.
FIG. 5 illustrates an exemplary comment dialog box.
FIG. 6 illustrates an exemplary signing overview dialog box showing exemplary information that can be embedded into a digital signature.
FIG. 7 illustrates a screen shot showing part of a signable data section that has been signed.
FIG. 8 sets forth a flow diagram of an exemplary process for building digital signatures.
FIG. 9 illustrates an exemplary electronic document, signature blocks, and digital signature.
The same numbers are used throughout the disclosure and figures to reference like components and features.
DETAILED DESCRIPTION Overview
Digital signatures and related methods and systems described below can provide an embedded view of data when signed that locks the signed data and permits it to be repurposed. Allowing signed data to be repurposed permits the signed data to be reused, allowing, for instance, other individuals to sign different portions of the signed data or the same signed data in a different presentation. An embedded view makes a digital signature more secure by capturing the context that lead to the decision to sign, without having to rely on a potentially unreliable or unavailable view.
This embedded view captures how data is presented when a signer makes a decision to sign. By seeing data in a particular way, a signer makes a decision to sign or not sign. Because this embedded view shows how the data was presented to the signer at signing and the context in which the data is shown, this embedded view can be important in establishing what the signer intended to sign.
These digital signatures may also include other embedded information that further secures the digital signature. Information sufficient to recreate the computer environment with which the embedded view was viewed, for instance, may be embedded to provide additional context for the embedded view. With this information (called “meta information”), a court of law can determine what computer environment is needed to recreate what a signer viewed at signing. The court can then recreate what the signer viewed by presenting the embedded view with this computer environment.
Comments, custom information, and the like also may be embedded to further secure and provide context for the digital signature.
Described below are these and other exemplary digital signatures and related methods and systems for building and using them. In some embodiments, the techniques and processes discussed herein may be implemented using one or more computer-readable media.
Exemplary Electronic Document and Signature Blocks
Referring to FIG. 1, an exemplary architecture 100 is shown having an electronic document 102 and signing application 104 accessible by a computer 106. This architecture 100 and its components are shown to aid in discussing, but are not intended to limit the applicability of, the digital signatures and their related methods.
In this architecture 100, the electronic document 102 is hierarchically structured and written using a tag-based language. In one embodiment, this language comprises eXtensible Markup Language (XML), though other structures and languages may be used. It is shown divided into signable data sections 102 a, 102 b, 102 c, and 102 d, each of which relates to various signature blocks 108, 110, 112, and 114, these relationships shown with dashed lines. These signature blocks are as yet unsigned, but are shown related to those data sections that they can lock once signed. These signature blocks can be structured to conform to the XML Signatures standard currently prescribed by the World Wide Web Consortium (W3C).
The signing application 104 comprises a user interface 116 (though this user interface 116 can be separate from the signing application 104), which can be used to aid a potential signer in signing a digital signature.
Creating Digital Signatures
Referring to FIG. 2, an exemplary process 200 for creating digital signatures is shown. The process 200 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104 and the user interface 116. This and other processes described herein may be implemented in any suitable hardware, software, firmware, or combination thereof. In the case of software and firmware, these processes represent sets of operations implemented as computer-executable instructions.
At block 202, an electronic document capable of being signed is presented to a potential signer. In an ongoing embodiment, the user interface 116 presents the electronic document 102 and enables selection of data sections 102 a, 102 b, 102 c, and 102 d for signing. The user interface 116 can present the electronic document 102 by transforming the XML into viewable HTML (Hyper Text Machine Language) using an XSLT (eXtensible Stylesheet Language Transformation) file or other suitable technique.
Referring to FIG. 3, a screen shot 300 showing a portion 302 of the electronic document 102 is shown. This portion 302 shows a view of part of the signable data section 102 a of the electronic document 102 and a selector 304 by which a user can select to sign this data section 102 a. The user can select to sign just the data section 102 a, just the data section 102 b, both the data sections 102 b and 102 c at once, or all of the data sections at once. This array of choices is enabled in this embodiment by the signature blocks 108, 110, 112, and 114. In the ongoing embodiment, the user selects to sign just the data section 102 a.
At block 204 of FIG. 2, an intention to sign the presented electronic document or its data section is received. In the ongoing embodiment, the user interface 116 receives a selection of the data section 102 a.
At block 206, a way in which the presented electronic document or its data section can be signed is determined. In the ongoing embodiment, the signing application 104 determines in which way the selected section can be signed by analyzing the signature block 108. The signature block 108 can set forth that this data section 102 a can be signed by only one person, by multiple persons as co-signers, or by multiple persons as counter-signers. It can also set forth that this data section 102 a permits a digital signature having meta information, comments, and custom data, for instance. The signing application 104 directs the user interface 116 according to the ways in which the selected section can be signed. In this embodiment, the user interface 116 follows blocks 208, 210 and 216 based on this direction from the signing application 104.
At block 208, a signer's identity is selected and received. In the ongoing embodiment, the user interface 116 enables selection of and receives the identity of the signer. The signer's identity can be represented by a private key in a infrastructure (PKI) certification or another suitable technique. In one embodiment, a person selecting a signer's identity can be different from that person's own identity. Thus, a person selecting the signer's identity can be acting as an agent for the signer, such as an assistant acting as an agent for his or her boss.
Referring to FIG. 4, a dialog box for certificate selection 400 presented by the user interface 116 is shown. Here the signer chooses a way by which his or her identity is certified.
At block 210 of FIG. 2, comments and/or custom information are enabled and received. In the ongoing embodiment, the user interface 116 enables the user to add comments. Comments or custom information can be received from sources other than the user, which will be described in greater detail below.
Referring to FIG. 5, a comment dialog box 500 presented by the user interface 116 is shown. Here the signer adds comments, if desired. Comments can help aid in analyzing a digital signature by adding context or otherwise setting the expressed intent of the signer. In this case, the signer simply comments that he approves of the applicant by his signature. In other cases, a signer might comment that he or she has reservations about some particular aspect of a document or data section he or she is signing. The user interface 116 can also present custom information options to the user (not shown), such as selecting a time stamp from a website, determining a location of the user with a global position device, and the like. This custom information can also be embedded in the digital signature to further secure and provide context for the digital signature.
At block 212 of FIG. 2, information sufficient to recreate the view currently seen of the data intended to be signed is determined. In the ongoing embodiment, the signing application 104 determines what computer environment is necessary to recreate the view of the data section 102 a currently presented to the potential signer. This environment is described with information about the computer's software and/or hardware and is called “meta information”. Using this meta information, a view embedded in the digital signature can later be verified by recreating that view from the data with the described computer environment.
At block 214, information that can be built into or locked by the digital signature is arranged or compiled. In the ongoing embodiment, the signing application 104 compiles the information that will be built into the digital signature if the user signs the data section 102 a. The signing application 104 compiles information received by the user interface 116, such as comments from the signer and the signer's identity. The signing application 104 also compiles other information, such as the meta information, in some cases custom information, and/or a static image of the view currently seen by the user.
At block 216, information that can be embedded into or locked by the digital signature is presented and the signature enabled and received. In the ongoing embodiment, the user interface 116 presents information that will be embedded into and locked by the digital signature if the user signs the data section 102 a. In this embodiment, the information comprises the user's PKI certification, the meta information, the comments, and the static image of the view of the data section 102 a and the other information shown at the moment signed. The static image can comprise data and information other than that which is signed so long as what is and is not signed in the static view can be differentiated.
In one embodiment, the static image comprises just the data signed, here the data section 102 a. In another embodiment, the static image comprises additional data, such as all the data of the electronic document 102.
Referring to FIG. 6, information that can be embedded in the digital signature, should the user sign, is presented by the user interface 116 using a signing overview dialog box 600. The user interface 116 presents the comment at 602, the meta information at 604, and the static image at 606. The user can choose to sign the digital signature by selecting a sign button 608. The user can choose to view the certificate by selecting a view certificate button 610. Prior to selecting the sign button 608, the user can select a confirmation checkbox 612, thereby recording that the user has verified the content of the overview dialog box 600 prior to signing.
As part of this presentation, the user interface 116 enables the user to check over the presented information, verify the content, and sign the digital signature.
At block 218 of FIG. 2, a digital signature with an embedded view of the data at signing that locks the signed data but permits the signed data to be repurposed is built. In the ongoing embodiment, the signing application 104 builds the digital signature by embedding the information into the digital signature that was presented to the signer with the signature overview dialog box 600. This digital signature comprises an embedded, static image 606 of the view of the data section 102 a that the signer viewed and selected to sign. This static image 606 secures the digital signature by showing in what way and to what extent the data section 102 a was presented to the signer. In one embodiment, the static image 606 does not show all of the data section 102 a. In this case the static image 606 shows the view presented to the signer of the data section 102 a, though this view can show less than all of the data of the data section 102 a.
Also in this ongoing embodiment, the digital signature comprises meta information 604 sufficient to recreate the computer environment by which the signer viewed the data section 102 a. This meta information 604 provides an additional check, or a stand-alone check if no static image is embedded, on the view of the data section 102 a seen by the signer.
Again in this embodiment, the digital signature comprises the comment 602 added by the signer. This comment 602 further secures and/or provide context for the signer's choice to sign the data section 102 a.
At block 220 of FIG. 2, the signed electronic document and/or data section is presented. In the ongoing embodiment, the user interface 116 presents the electronic document 102 showing the data section 102 a as signed and by whom. The data section 102 a is locked by the digital signature, and the electronic document 102 and the data section 102 a are repurposable. In some embodiments, all of the other data of the electronic document 102 (the data 102 b, 102 c, and 102 d) can be changed without breaking the digital signature on the data section 102 a, while the data section 102 a can be repurposed but not changed. Thus, other people can view and change the electronic document 102 except for the data section 102 a. They can also view, reuse, and re-present the data section 102 a. They can view the signed data section 102 a as seen by the signer by viewing the static image 606, which is embedded in the digital signature. They can also co-sign or counter-sign the signed data section 102 a (as permitted by the signature block 108). This digital signature can also insure that the data section 102 a that is signed by a co-signer or counter-signer is identical to that signed by the first signer.
For documents that have many sections and need many signatures, especially if these sections and signatures overlap, this embodiment of the digital signature enables efficient reviewing and signing. A later signer of all of the data sections of the electronic document 102, for instance, knows that if the data section 102 a is signed, that he or she is signing data that is identical to that which was previously signed. In some cases this is very important. For example, a CEO of a company may need to sign all of a document, but before doing so wants to know if what he is signing has already been signed by other appropriate persons. If data section 102 a is related to safety standards, the CEO may want to know that the head engineer of the company has signed this data section 102 a before the CEO signs the entire electronic document 102. The CEO also may want to be sure that the data section 102 a has not changed since it was signed. In this embodiment, the CEO can be sure that the data signed by the head engineer has been signed and has not changed. Because this digital signature permits signed data to be read by machines, and thus be repurposed, the CEO can view the data section 102 a as seen by the engineer at signing, or repurpose the data section 102 a to see it in another view. When the CEO signs the whole document (here following the signature block 114) he can be signing data that has previously been signed (the data section 102 a) and data that has not (e.g., the data section 102 d).
Referring to FIG. 7, the user interface 116 presents a view 700 of the data section 102 a of the electronic document 102. The data section 102 a is shown with an indication that it has been signed with text and an icon, shown at 702. Data within the data section 102 a is locked; thus, the comments and hiring recommendation shown at 704 and 706 cannot be changed without breaking the signature shown at 702. Each signature block can permit a single signature, co-signatures, or counter-signatures for each data section to which it pertains. In this embodiment, another signature of the data section 102 a is not permitted by the signature block 108, and so a choice to add another signature is not enabled at this location. Elsewhere in the electronic document 102, a signature can be enabled of all of the electronic document 102, the data section 102 b, or the data sections 102 b and 102 c at once, as prescribed by the signature blocks 110, 112, and 114.
An exemplary method by which the signing application 104 can build digital signatures and exemplary structures for these digital signature are set forth below.
Exemplary Method for Building Digital Signatures
Referring to FIG. 8, an exemplary process 800 for building digital signatures is shown. This process 800 is illustrated as a series of blocks representing individual operations or acts performed by the signing application 104. This process 800 is an exemplary implementation of the block 218 of FIG. 2, though this process 800 can be implemented separately as a stand-alone process or otherwise not implemented as part of the process 200.
In one embodiment of the process 800, the signing application 104 builds a digital signature in part by embedding information into a signature block and then locking the embedded information. In other embodiments, however, information is embedded directly into a digital signature without first embedding it into a signature block. In still others, information is embedded into a signature block and locked, but other parts of the signature block are not locked and so remain changeable.
In each of the blocks 802, 804, 806, 808, 810, and 812, the signing application 104 can embed information into a digital signature by embedding the information into a signature block. The signature block can then be locked, thereby creating a digital signature comprising the information embedded into the signature block.
At block 802, the signing application 104 embeds the view of the signed data into the digital signature. In one embodiment, the signing application 104 embeds information into one of the signature blocks 108, 110, 112, and 114 and then locks the embedded information. The data signed is the data to which the signature block pertains.
In the illustrated and described embodiment, the signature blocks 108, 110, 112, and 114 comprise XML selector (e.g., and XPath expression) indicating the data of the electronic document 102 on which a signature can be made. For example, the signature block 108 indicates the data section 102 a as signable. Similarly, the signature block 114 indicates the data sections 102 a, 102 b, 102 c, and 102 d as signable together. These signature blocks can indicate what part is signable through the tree or subtree for the data section 102 a of the hierarchically structured electronic document 102.
The view embedded by the signing application 104 can comprise a static image seen by the signer at signing. In the ongoing embodiment, the signing application 104 embeds the static image 606 into the signature block 108 as a portable network graphic (PNG) file.
Referring to FIG. 9, an exemplary digital signature 902 is shown. This digital signature 902 is based on the ongoing example using the signature block 108 of FIG. 1. The digital signature 902 comprises the signature block 108, embedded information, and a locking element. Here the signing application 104 embeds the static image 606 within the digital signature 902 as a PNG file of an embedded static image 904.
At block 804 of FIG. 8, the signing application 104 embeds meta information sufficient to recreate the embedded view from the signed data. This meta information comprises specifications of the computer environment used by the signer to view the signed data, such as system date, time, and time-zone, the versions of the operating system and the signing application 104, system data (e.g., type of processor), number of monitors, type of monitors, type and/or version of image application that rendered the view, and/or the like.
Referring to FIG. 9, an embedded meta information 906 is shown. In the ongoing embodiment the embedded meta information 906 comprises the meta information 604: “System date/time: Friday, Jan. 16, 2004 4:02”; “Windows version: 5.1.2600”; “Office version: 11.0.5870”; “InfoPath version: 11.0.5924”; and “Number of monitors: 1.”
At block 806 of FIG. 8, the signing application 104 embeds into the digital signature information sufficient to indicate the identity of the signer.
Referring to FIG. 9, an embedded signer identity 908 is shown. In the ongoing embodiment, the embedded identity 906 comprises a PKI certification issued by Microsoft™ and shown in FIG. 5.
At block 808 of FIG. 8, the signing application 104 embeds a comment into the digital signature.
Referring to FIG. 9, embedded comment information 910 is shown. In the ongoing embodiment, the embedded comment 910 comprises the text “I approve” of the comment 602 of FIG. 6.
At block 810 of FIG. 8, the signing application 104 can embed custom information into the digital signature. This custom information can be received from the signer or another source. The signing application 104 can, for instance, receive custom information from remote locations (such as a time-stamp from a government or other reliable website), a GPS (Global Positioning Satellite) device, and the like. This custom information can be added to the digital signature 902 using custom user code (e.g., script) or other manners for extending the signature block 108 and/or the digital signature 902.
Referring to FIG. 9, embedded custom information 912 is shown. In the ongoing embodiment, the embedded custom information 912 comprises a GPS-determined physical location of the signer's computer (the computer 106) at signing.
At block 812 of FIG. 8, the signing application 104 embeds information indicating what data is signed into the digital signature. In some embodiments, this information is a transformation indicating the data signed, such as by pointing to part or all of an electronic document. This transformation can indicate a particular subtree or subtrees of a structured electronic document to which the digital signature pertains.
Referring to FIG. 9, an embedded data indicator 914 is shown. In this embodiment, the data indicator 914 is part of the signature block 108. In embodiments not using a signature block, the signing application 104 embeds the data indicator 914 into the digital signature 902.
At block 814 of FIG. 8, the signing application 104 locks the digital signature. The signing application 104 can lock the digital signature by computing a strong cryptographic hash over the signed data and the embedded information, or with another suitable technique. The signing application 104 can also embed the strong cryptographic hash within the digital signature.
In the ongoing embodiment of the digital signature 902, the signing application 104 computes a strong cryptographic hash over the information embedded within the signature block 108, such as the static image 904, the meta information 906, the signer identity 908, the comment information 910, the custom information 912, and/or the data indicator 914, and the signed data (indicated by the indicator 914). This strong cryptographic hash is added to the digital signature 902 and locks the embedded information of the digital signature 902 and the signed data (here the data section 102 a). If any of the information or the signed data is changed, the strong cryptographic hash of the digital signature 902 will not match with a new hash computed over the changed information and/or signed data. Because of this, the digital signature 902 will be deemed invalid if these are changed. The strong cryptographic hash does not, however, prevent the embedded information from being viewed by persons. It also does not prevent the signed data from being read by a machine. Because the signed data can be read by a machine, it can also be repurposed without breaking the digital signature 902.
Referring to FIG. 9, a signature lock 916 is shown in the digital signature 902. In this embodiment, the digital signature lock 916 comprises the strong cryptographic hash described above.
The digital signature 902 is shown as the signature block 108 with embedded information and locked with a strong cryptographic hash. In other embodiments, however, a digital signature can be built without use of a signature block. In these cases the signing application 104 collects the information, determines the data that is intended to be signed, embeds the information into a digital signature and locks the information and the data.
CONCLUSION
The above-described digital signatures are secured by an embedded view of the signed data and also permit that data to be repurposed. Although the invention has been described in language specific to structural features and/or methodological acts, it is to be understood that the invention defined in the appended claims is not necessarily limited to the specific features or acts described. Rather, the specific features and acts are disclosed as exemplary forms of implementing the claimed invention.

Claims (21)

1. A computer-readable medium storing a digital signature, wherein the digital signature comprises an embedded view of signed data, the embedded view locking the signed data and comprising a visual representation of the signed data as seen by a signer if signing the signed data, and wherein the embedded view permits the signed data to be repurposed to allow the signed data to be co-signed or counter-signed, wherein the digital signature further comprises embedded information sufficient to recreate the embedded view from the signed data, the embedded information including one or more specifications of a computing environment used to present the visual representation, and wherein the digital signature further comprises a signature block comprising an XML tag indicating the signed data from other data of an electronic document.
2. The computer-readable medium of claim 1, wherein the digital signature further comprises embedded comments received from the signer.
3. The computer-readable medium of claim 1, wherein the digital signature further comprises embedded custom information.
4. The computer-readable medium of claim 3, wherein the embedded custom information comprises a physical location of the signer.
5. The computer-readable medium of claim 3, wherein the embedded custom information comprises custom user code extending the digital signature.
6. The computer-readable medium of claim 1, wherein the digital signature further comprises the signed data.
7. The computer-readable medium of claim 1, wherein the signed data is part of an electronic document.
8. The computer-readable medium of claim 1, wherein the digital signature further comprises a strong cryptographic hash computed over the embedded view and the signed data effective to lock the embedded view and the signed data.
9. The computer-readable medium of claim 1, wherein the signed data comprises extensible markup language.
10. A computer-readable medium storing a digital signature comprising a static image of signed data when signed, wherein the digital signature is configured to lock the signed data and permit the signed data to be repurposed, the digital signature further comprising embedded information sufficient to recreate a view of the signed data that is identical to the static image, the embedded information including one or more specifications of a computing environment used to present the signed data, wherein the view provides a first visual representation associated with the signed data as seen by a signer if signing the signed data, and wherein the digital signature is further configured to permit at least one of:
viewing a second visual representation of the signed data different than the first visual representation; or
co-signing or counter-signing the signed data.
11. The computer-readable medium of claim 10, wherein the sufficient information indicates an operating system version and a number of monitors.
12. One or more computer-readable media storing computer executable instructions that, when executed by a computer, perform a method comprising:
embedding a static image of data into a signature block of a digital signature, wherein at least a portion of the data is identifiable as signed data that is repurposable allowing a second digital signature of the signed data to be built, and wherein the static image provides a visual representation of the signed data as seen by a signer if signing the signed data, wherein the signature block comprises an XML tag indicating the repurposable signed data; and
embedding information into the digital signature sufficient to recreate the static image from the signed data, the embedded information including one or more specifications of a computing environment used to present the static image.
13. The computer-readable media of claim 12, wherein the acts further comprise embedding a second static image of the signed data into the second digital signature.
14. The computer-readable media of claim 12, wherein the acts further comprise presenting an electronic document comprising the signed data and receiving a selection to sign the signed data.
15. The computer-readable media of claim 12, wherein the acts further comprise embedding a certificate indicating an identity of the signer into the digital signature.
16. The computer-readable media of claim 12, wherein the acts further comprise embedding comments into the digital signature.
17. The computer-readable media of claim 12, wherein the acts further comprise embedding a time-stamp into the digital signature.
18. The computer-readable media of claim 12, wherein the acts further comprise embedding custom information into the digital signature by extending the digital signature.
19. The computer-readable media of claim 12, wherein the acts further comprise locking the digital signature by computing a strong cryptographic hash over the static image and the signed data.
20. A method comprising:
receiving a digital signature having an embedded static image of data, wherein at least a portion of the data is identifiable as signed data, and wherein the embedded static image provides a visual representation of the signed data as seen by a signer if signing the signed data, wherein the digital signature further comprises embedded information sufficient to recreate the static image from the signed data, the embedded information including one or more specifications of a computing environment used to present the static image; and
repurposing the signed data without breaking the digital signature, wherein the act of repurposing comprises:
building a second digital signature of the signed data; and
presenting a static image of the signed data that is different than the embedded static image.
21. The method of claim 20, further comprising recreating the static image from the signed data.
US10/846,428 2004-05-13 2004-05-13 Digital signatures with an embedded view Active 2026-01-27 US7568101B1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US10/846,428 US7568101B1 (en) 2004-05-13 2004-05-13 Digital signatures with an embedded view
US10/876,418 US7533268B1 (en) 2004-05-13 2004-06-25 Digital signature with an embedded view

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US10/846,428 US7568101B1 (en) 2004-05-13 2004-05-13 Digital signatures with an embedded view

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/876,418 Division US7533268B1 (en) 2004-05-13 2004-06-25 Digital signature with an embedded view

Publications (1)

Publication Number Publication Date
US7568101B1 true US7568101B1 (en) 2009-07-28

Family

ID=40601670

Family Applications (2)

Application Number Title Priority Date Filing Date
US10/846,428 Active 2026-01-27 US7568101B1 (en) 2004-05-13 2004-05-13 Digital signatures with an embedded view
US10/876,418 Active 2026-01-30 US7533268B1 (en) 2004-05-13 2004-06-25 Digital signature with an embedded view

Family Applications After (1)

Application Number Title Priority Date Filing Date
US10/876,418 Active 2026-01-30 US7533268B1 (en) 2004-05-13 2004-06-25 Digital signature with an embedded view

Country Status (1)

Country Link
US (2) US7568101B1 (en)

Cited By (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070011457A1 (en) * 2005-07-06 2007-01-11 Encomia, L.P. Method for displaying and printing different sizes of SMART Docs
US20080097777A1 (en) * 2006-10-23 2008-04-24 Ctm Software Corporation Electronic document execution
US20090024912A1 (en) * 2007-07-18 2009-01-22 Docusign, Inc. Systems and methods for distributed electronic signature documents
US20090132814A1 (en) * 2006-08-04 2009-05-21 Fujitsu Limited Program, method and apparatus for managing electronic documents
US20090292786A1 (en) * 2007-07-18 2009-11-26 Docusign, Inc. Systems and methods for distributed electronic signature documents
US20090313743A1 (en) * 2008-06-20 2009-12-24 Craig Jason Hofmeyer Pants with saggy pants control system
US20100017426A1 (en) * 2008-07-15 2010-01-21 International Business Machines Corporation Form Attachment Metadata Generation
US20100157365A1 (en) * 2008-12-24 2010-06-24 Samsung Electronics Co., Ltd Method to generate digital signature, print controlling terminal, and image forming apparatus
US20100201182A1 (en) * 2005-01-14 2010-08-12 Michael John Gottschalk Continuous radius axle and fabricated spindle assembly
US20100287260A1 (en) * 2009-03-13 2010-11-11 Docusign, Inc. Systems and methods for document management transformation and security
US7925621B2 (en) 2003-03-24 2011-04-12 Microsoft Corporation Installing a solution
US7937651B2 (en) 2005-01-14 2011-05-03 Microsoft Corporation Structural editing operations for network forms
US7971139B2 (en) 2003-08-06 2011-06-28 Microsoft Corporation Correlation, association, or correspondence of electronic forms
US7979856B2 (en) 2000-06-21 2011-07-12 Microsoft Corporation Network-based software extensions
US8001459B2 (en) 2005-12-05 2011-08-16 Microsoft Corporation Enabling electronic documents for limited-capability computing devices
US8010515B2 (en) 2005-04-15 2011-08-30 Microsoft Corporation Query to an electronic form
US8074217B2 (en) 2000-06-21 2011-12-06 Microsoft Corporation Methods and systems for delivering software
US8117552B2 (en) 2003-03-24 2012-02-14 Microsoft Corporation Incrementally designing electronic forms and hierarchical schemas
US8200975B2 (en) 2005-06-29 2012-06-12 Microsoft Corporation Digital signatures for network forms
US20130097493A1 (en) * 2011-10-17 2013-04-18 International Business Machines Corporation Managing Digital Signatures
US20140007221A1 (en) * 2012-06-29 2014-01-02 Jasmeet Chhabra Secure image authentication
US8793499B2 (en) 2012-01-20 2014-07-29 Lockheed Martin Corporation Nested digital signatures with constant file size
US8892993B2 (en) 2003-08-01 2014-11-18 Microsoft Corporation Translation file
US8918729B2 (en) 2003-03-24 2014-12-23 Microsoft Corporation Designing electronic forms
US8949708B2 (en) 2010-06-11 2015-02-03 Docusign, Inc. Web-based electronically signed documents
US9185081B2 (en) * 2012-10-22 2015-11-10 Symantec Corporation Format friendly encryption
US9229917B2 (en) 2003-03-28 2016-01-05 Microsoft Technology Licensing, Llc Electronic form user interfaces
US9230130B2 (en) 2012-03-22 2016-01-05 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
US9268758B2 (en) 2011-07-14 2016-02-23 Docusign, Inc. Method for associating third party content with online document signing
US9514117B2 (en) 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
US9565188B2 (en) 2013-10-17 2017-02-07 Scrypt, Inc System and method for digitally signing documents from a mobile device
US9628462B2 (en) 2011-07-14 2017-04-18 Docusign, Inc. Online signature identity and verification in community
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US10033533B2 (en) 2011-08-25 2018-07-24 Docusign, Inc. Mobile solution for signing and retaining third-party documents
US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents
US20210286938A1 (en) * 2015-01-30 2021-09-16 Docusign, Inc. Systems and Methods for Obtaining an Electronic Signature Via a Word Processing Application

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140068409A1 (en) * 2004-12-21 2014-03-06 Signaturelink, Inc. Systems and Methods for Capturing Real Time Client Side Data and For Generating a Permanent Record
US8121946B1 (en) * 2006-08-01 2012-02-21 United Services Automobile Association System and method for modular electronic signature block
JP5501232B2 (en) * 2007-09-04 2014-05-21 インターナショナル・ビジネス・マシーンズ・コーポレーション System and method for verifying electronic documents
TW201502851A (en) 2013-07-05 2015-01-16 Think Cloud Digital Technology Co Ltd Digital signature method
US20160071104A1 (en) * 2013-09-04 2016-03-10 George Gregory Stamatis Securebuy merchant information analytics decision engine
EP3701399B1 (en) * 2017-10-23 2023-05-31 Notarize, Inc. System and method for automated online notarization meeting recovery
US10931463B2 (en) * 2017-11-14 2021-02-23 Microsoft Technology Licensing, Llc. Cryptographic verification of a compressed archive
US11023602B2 (en) * 2019-04-24 2021-06-01 EMC IP Holding Company LLC Preventing digital forgery
US10673637B1 (en) * 2019-11-19 2020-06-02 Quantum Information Security, LLC Polymorphic digital security and methods of use thereof

Citations (99)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4201978A (en) 1978-10-19 1980-05-06 NCR Canada Ltd. -- NCR Canada Ltee Document processing system
US4498147A (en) 1982-11-18 1985-02-05 International Business Machines Corporation Methodology for transforming a first editable document form prepared with a batch text processing system to a second editable document form usable by an interactive or batch text processing system
US4514800A (en) 1981-05-22 1985-04-30 Data General Corporation Digital computer system including apparatus for resolving names representing data items and capable of executing instructions belonging to general instruction sets
US4564752A (en) 1982-12-23 1986-01-14 Ncr Canada Ltd Concurrent, image-based, reject-re-entry system and method
US4641274A (en) 1982-12-03 1987-02-03 International Business Machines Corporation Method for communicating changes made to text form a text processor to a remote host
US4674040A (en) 1984-12-26 1987-06-16 International Business Machines Corporation Merging of documents
US4723211A (en) 1984-08-30 1988-02-02 International Business Machines Corp. Editing of a superblock data structure
US4739477A (en) 1984-08-30 1988-04-19 International Business Machines Corp. Implicit creation of a superblock data structure
US4815029A (en) 1985-09-23 1989-03-21 International Business Machines Corp. In-line dynamic editor for mixed object documents
US4847749A (en) 1986-06-13 1989-07-11 International Business Machines Corporation Job interrupt at predetermined boundary for enhanced recovery
US4910663A (en) 1987-07-10 1990-03-20 Tandem Computers Incorporated System for measuring program execution by replacing an executable instruction with interrupt causing instruction
US4933880A (en) 1988-06-15 1990-06-12 International Business Machines Corp. Method for dynamically processing non-text components in compound documents
US4962475A (en) 1984-12-26 1990-10-09 International Business Machines Corporation Method for generating a document utilizing a plurality of windows associated with different data objects
US5025484A (en) 1987-12-11 1991-06-18 Kabushiki Kaisha Toshiba Character reader device
US5072412A (en) 1987-03-25 1991-12-10 Xerox Corporation User interface with multiple workspaces for sharing display system objects
US5179703A (en) 1987-11-17 1993-01-12 International Business Machines Corporation Dynamically adaptive environment for computer programs
US5182709A (en) 1986-03-31 1993-01-26 Wang Laboratories, Inc. System for parsing multidimensional and multidirectional text into encoded units and storing each encoded unit as a separate data structure
US5187786A (en) 1991-04-05 1993-02-16 Sun Microsystems, Inc. Method for apparatus for implementing a class hierarchy of objects in a hierarchical file system
US5191645A (en) 1991-02-28 1993-03-02 Sony Corporation Of America Digital signal processing system employing icon displays
US5195183A (en) 1989-01-31 1993-03-16 Norand Corporation Data communication system with communicating and recharging docking apparatus for hand-held data terminal
US5204947A (en) 1990-10-31 1993-04-20 International Business Machines Corporation Application independent (open) hypermedia enablement services
US5206951A (en) 1987-08-21 1993-04-27 Wang Laboratories, Inc. Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types
US5218672A (en) 1990-01-19 1993-06-08 Sony Corporation Of America Offline editing system with user interface for controlling edit list generation
US5222160A (en) 1989-12-28 1993-06-22 Fujitsu Limited Document revising system for use with document reading and translating system
US5228100A (en) 1989-07-10 1993-07-13 Hitachi, Ltd. Method and system for producing from document image a form display with blank fields and a program to input data to the blank fields
US5237680A (en) 1990-09-27 1993-08-17 Sun Microsystems, Inc. Method for incremental rename propagation between hierarchical file name spaces
US5249275A (en) 1986-04-21 1993-09-28 Texas Instruments Incorporated Apparatus and method enabling a compiled program to exactly recreate its source code
US5274803A (en) 1991-04-26 1993-12-28 Sun Microsystems, Inc. Method and apparatus for aligning a restored parent environment to its child environments with minimal data loss
US5297283A (en) 1989-06-29 1994-03-22 Digital Equipment Corporation Object transferring system and method in an object based computer operating system
US5297249A (en) 1990-10-31 1994-03-22 International Business Machines Corporation Hypermedia link marker abstract and search services
US5313646A (en) 1989-02-24 1994-05-17 Sun Microsystems, Inc. Method and apparatus for translucent file system
US5313631A (en) 1991-05-21 1994-05-17 Hewlett-Packard Company Dual threshold system for immediate or delayed scheduled migration of computer data files
US5317686A (en) 1990-09-10 1994-05-31 Lotus Development Corporation Data processing apparatus and method for a reformattable multidimensional spreadsheet
US5333317A (en) 1989-12-22 1994-07-26 Bull Hn Information Systems Inc. Name resolution in a directory database
US5339423A (en) 1989-06-16 1994-08-16 International Business Machines Corporation System for accessing objects external to an application using tables containing path definitions
US5339424A (en) 1991-04-19 1994-08-16 Mitsubishi Denki Kabushiki Kaisha System and method for compiling and executing a computer program written in more than one programming language
US5341478A (en) 1990-08-14 1994-08-23 Digital Equipment Corporation Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
US5369766A (en) 1993-03-25 1994-11-29 Taligent, Inc. Object-oriented loader system with support for different load formats
US5369778A (en) 1987-08-21 1994-11-29 Wang Laboratories, Inc. Data processor that customizes program behavior by using a resource retrieval capability
US5371675A (en) 1992-06-03 1994-12-06 Lotus Development Corporation Spreadsheet program which implements alternative range references
US5377323A (en) 1991-09-13 1994-12-27 Sun Microsytems, Inc. Apparatus and method for a federated naming system which can resolve a composite name composed of names from any number of disparate naming systems
US5379419A (en) 1990-12-07 1995-01-03 Digital Equipment Corporation Methods and apparatus for accesssing non-relational data files using relational queries
US5381547A (en) 1989-11-29 1995-01-10 Siemens Aktiengesellschaft Method for dynamically linking definable program elements of an interactive data processing system
US5390325A (en) 1992-12-23 1995-02-14 Taligent, Inc. Automated testing system
US5396623A (en) 1992-10-30 1995-03-07 Bmc Software Inc. Method for editing the contents of a DB2 table using an editproc manager
US5408665A (en) 1993-04-30 1995-04-18 Borland International, Inc. System and methods for linking compiled code with extended dictionary support
US5410688A (en) 1989-07-21 1995-04-25 Hewlett-Packard Company Distributed object based systems for communicating object data among different storage domains
US5410646A (en) 1991-01-31 1995-04-25 Park City Group, Inc. System and method for creating, processing, and storing forms electronically
US5412772A (en) 1992-10-13 1995-05-02 Novell, Inc. System for permitting a view of an object or a user interface to be exchanged between operating system environments
US5434975A (en) 1992-09-24 1995-07-18 At&T Corp. System for interconnecting a synchronous path having semaphores and an asynchronous path having message queuing for interprocess communications
US5436637A (en) 1993-03-05 1995-07-25 Borland International, Inc. Graphical user interface system and methods for improved user feedback
US5438659A (en) 1992-10-08 1995-08-01 Hewlett-Packard Company Object-action user interface management system
US5440744A (en) 1990-08-14 1995-08-08 Digital Equipment Corporation Methods and apparatus for implementing server functions in a distributed heterogeneous environment
US5446842A (en) 1993-02-26 1995-08-29 Taligent, Inc. Object-oriented collaboration system
US5455875A (en) 1992-12-15 1995-10-03 International Business Machines Corporation System and method for correction of optical character recognition with display of image segments according to character data
US5459865A (en) 1993-04-05 1995-10-17 Taligent Inc. Runtime loader
US5481722A (en) 1991-08-19 1996-01-02 Sun Microsystems, Inc. Method and apparatus for merging change control delta structure files of a source module from a parent and a child development environment
US5497489A (en) 1987-05-05 1996-03-05 Menne; David M. Data storage and retrieval systems having labelling for data
US5504898A (en) 1994-06-20 1996-04-02 Candle Distributed Solutions, Inc. Threaded environment for AS/400
US5517655A (en) 1991-04-26 1996-05-14 Hewlett-Packard Company Method for monitoring transactions in an object-oriented environment
US5535389A (en) 1993-01-26 1996-07-09 International Business Machines Corporation Business process objects with associated attributes such as version identifier
US5542070A (en) 1993-05-20 1996-07-30 Ag Communication Systems Corporation Method for rapid development of software systems
US5550976A (en) 1992-12-08 1996-08-27 Sun Hydraulics Corporation Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5551035A (en) 1989-06-30 1996-08-27 Lucent Technologies Inc. Method and apparatus for inter-object communication in an object-oriented program controlled system
US5555325A (en) 1993-10-22 1996-09-10 Lockheed Martin Federal Systems, Inc. Data capture variable priority method and system for managing varying processing capacities
US5566330A (en) 1991-08-20 1996-10-15 Powersoft Corporation Method for forming a reusable and modifiable database interface object
US5572643A (en) 1995-10-19 1996-11-05 Judson; David H. Web browser with dynamic display of information objects during linking
US5572648A (en) 1993-01-19 1996-11-05 Canon Kabushiki Kaisha System for simultaneously displaying a static tool palette having predefined windowing tool functions and a dynamic tool palette which changes windowing tool functons in accordance with a context of an executed application program
US5577252A (en) 1993-07-28 1996-11-19 Sun Microsystems, Inc. Methods and apparatus for implementing secure name servers in an object-oriented system
US5581760A (en) 1992-07-06 1996-12-03 Microsoft Corporation Method and system for referring to and binding to objects using identifier objects
US5581686A (en) 1992-12-01 1996-12-03 Microsoft Corporation Method and system for in-place interaction with contained objects
US5600789A (en) 1992-11-19 1997-02-04 Segue Software, Inc. Automated GUI interface testing
US5602996A (en) 1993-01-27 1997-02-11 Apple Computer, Inc. Method and apparatus for determining window order when one of multiple displayed windows is selected
US5608720A (en) 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
US5625783A (en) 1994-12-13 1997-04-29 Microsoft Corporation Automated system and method for dynamic menu construction in a graphical user interface
US5627979A (en) 1994-07-18 1997-05-06 International Business Machines Corporation System and method for providing a graphical user interface for mapping and accessing objects in data stores
US5630126A (en) 1994-12-13 1997-05-13 International Business Machines Corp. Systems and methods for integrating computations into compound documents
US5634124A (en) 1987-08-21 1997-05-27 Wang Laboratories, Inc. Data integration by object management
US5634121A (en) 1995-05-30 1997-05-27 Lockheed Martin Corporation System for identifying and linking domain information using a parsing process to identify keywords and phrases
US5640544A (en) 1991-12-28 1997-06-17 Nec Corporation Computer network having an asynchronous document data management system
US5644738A (en) 1995-09-13 1997-07-01 Hewlett-Packard Company System and method using context identifiers for menu customization in a window
US5649099A (en) 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US5659729A (en) 1996-02-01 1997-08-19 Sun Microsystems, Inc. Method and system for implementing hypertext scroll attributes
US5664178A (en) 1992-07-06 1997-09-02 Microsoft Corporation Method and system for organizing internal structure of a file
US5668966A (en) 1994-02-15 1997-09-16 International Business Machines Corporation System and method for direct manipulation of search predicates using a graphical user interface
US5669005A (en) 1993-05-10 1997-09-16 Apple Computer, Inc. System for automatically embedding or incorporating contents added to a document
US5689667A (en) 1995-06-06 1997-11-18 Silicon Graphics, Inc. Methods and system of controlling menus with radial and linear portions
US5704029A (en) 1994-05-23 1997-12-30 Wright Strategies, Inc. System and method for completing an electronic form
US5706501A (en) 1995-02-23 1998-01-06 Fuji Xerox Co., Ltd. Apparatus and method for managing resources in a network combining operations with name resolution functions
US5717939A (en) 1991-11-18 1998-02-10 Compaq Computer Corporation Method and apparatus for entering and manipulating spreadsheet cell data
US5721824A (en) 1996-04-19 1998-02-24 Sun Microsystems, Inc. Multiple-package installation with package dependencies
US5742504A (en) 1995-11-06 1998-04-21 Medar, Inc. Method and system for quickly developing application software for use in a machine vision system
US5745683A (en) 1995-07-05 1998-04-28 Sun Microsystems, Inc. System and method for allowing disparate naming service providers to dynamically join a naming federation
US5745712A (en) 1990-10-31 1998-04-28 Borland International, Inc. Graphical programming system and methods for assisting a user with creating screen objects on a screen device
US5748807A (en) 1992-10-09 1998-05-05 Panasonic Technologies, Inc. Method and means for enhancing optical character recognition of printed documents
US5758184A (en) 1995-04-24 1998-05-26 Microsoft Corporation System for performing asynchronous file operations requested by runnable threads by processing completion messages with different queue thread and checking for completion by runnable threads
US6307955B1 (en) * 1998-12-18 2001-10-23 Topaz Systems, Inc. Electronic signature management system
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US20050132196A1 (en) * 2003-12-16 2005-06-16 Josef Dietl Electronic signatures

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5761408A (en) 1996-01-16 1998-06-02 Parasoft Corporation Method and system for generating a computer program test suite using dynamic symbolic execution
US5758358A (en) 1996-01-29 1998-05-26 Microsoft Corporation Method and system for reconciling sections of documents
US5761683A (en) 1996-02-13 1998-06-02 Microtouch Systems, Inc. Techniques for changing the behavior of a link in a hypertext document
US6757826B1 (en) * 1998-04-14 2004-06-29 Citicorp Development Center, Inc. Digital graphic signature system
US6671805B1 (en) * 1999-06-17 2003-12-30 Ilumin Corporation System and method for document-driven processing of digitally-signed electronic documents

Patent Citations (102)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4201978A (en) 1978-10-19 1980-05-06 NCR Canada Ltd. -- NCR Canada Ltee Document processing system
US4514800A (en) 1981-05-22 1985-04-30 Data General Corporation Digital computer system including apparatus for resolving names representing data items and capable of executing instructions belonging to general instruction sets
US4498147A (en) 1982-11-18 1985-02-05 International Business Machines Corporation Methodology for transforming a first editable document form prepared with a batch text processing system to a second editable document form usable by an interactive or batch text processing system
US4641274A (en) 1982-12-03 1987-02-03 International Business Machines Corporation Method for communicating changes made to text form a text processor to a remote host
US4564752A (en) 1982-12-23 1986-01-14 Ncr Canada Ltd Concurrent, image-based, reject-re-entry system and method
US4723211A (en) 1984-08-30 1988-02-02 International Business Machines Corp. Editing of a superblock data structure
US4739477A (en) 1984-08-30 1988-04-19 International Business Machines Corp. Implicit creation of a superblock data structure
US4962475A (en) 1984-12-26 1990-10-09 International Business Machines Corporation Method for generating a document utilizing a plurality of windows associated with different data objects
US4674040A (en) 1984-12-26 1987-06-16 International Business Machines Corporation Merging of documents
US4815029A (en) 1985-09-23 1989-03-21 International Business Machines Corp. In-line dynamic editor for mixed object documents
US5182709A (en) 1986-03-31 1993-01-26 Wang Laboratories, Inc. System for parsing multidimensional and multidirectional text into encoded units and storing each encoded unit as a separate data structure
US5249275A (en) 1986-04-21 1993-09-28 Texas Instruments Incorporated Apparatus and method enabling a compiled program to exactly recreate its source code
US4847749A (en) 1986-06-13 1989-07-11 International Business Machines Corporation Job interrupt at predetermined boundary for enhanced recovery
US5072412A (en) 1987-03-25 1991-12-10 Xerox Corporation User interface with multiple workspaces for sharing display system objects
US5497489A (en) 1987-05-05 1996-03-05 Menne; David M. Data storage and retrieval systems having labelling for data
US4910663A (en) 1987-07-10 1990-03-20 Tandem Computers Incorporated System for measuring program execution by replacing an executable instruction with interrupt causing instruction
US5206951A (en) 1987-08-21 1993-04-27 Wang Laboratories, Inc. Integration of data between typed objects by mutual, direct invocation between object managers corresponding to object types
US5369778A (en) 1987-08-21 1994-11-29 Wang Laboratories, Inc. Data processor that customizes program behavior by using a resource retrieval capability
US5634124A (en) 1987-08-21 1997-05-27 Wang Laboratories, Inc. Data integration by object management
US5179703A (en) 1987-11-17 1993-01-12 International Business Machines Corporation Dynamically adaptive environment for computer programs
US5025484A (en) 1987-12-11 1991-06-18 Kabushiki Kaisha Toshiba Character reader device
US4933880A (en) 1988-06-15 1990-06-12 International Business Machines Corp. Method for dynamically processing non-text components in compound documents
US5195183A (en) 1989-01-31 1993-03-16 Norand Corporation Data communication system with communicating and recharging docking apparatus for hand-held data terminal
US5313646A (en) 1989-02-24 1994-05-17 Sun Microsystems, Inc. Method and apparatus for translucent file system
US5339423A (en) 1989-06-16 1994-08-16 International Business Machines Corporation System for accessing objects external to an application using tables containing path definitions
US5297283A (en) 1989-06-29 1994-03-22 Digital Equipment Corporation Object transferring system and method in an object based computer operating system
US5551035A (en) 1989-06-30 1996-08-27 Lucent Technologies Inc. Method and apparatus for inter-object communication in an object-oriented program controlled system
US5228100A (en) 1989-07-10 1993-07-13 Hitachi, Ltd. Method and system for producing from document image a form display with blank fields and a program to input data to the blank fields
US5410688A (en) 1989-07-21 1995-04-25 Hewlett-Packard Company Distributed object based systems for communicating object data among different storage domains
US5381547A (en) 1989-11-29 1995-01-10 Siemens Aktiengesellschaft Method for dynamically linking definable program elements of an interactive data processing system
US5333317A (en) 1989-12-22 1994-07-26 Bull Hn Information Systems Inc. Name resolution in a directory database
US5222160A (en) 1989-12-28 1993-06-22 Fujitsu Limited Document revising system for use with document reading and translating system
US5218672A (en) 1990-01-19 1993-06-08 Sony Corporation Of America Offline editing system with user interface for controlling edit list generation
US5440744A (en) 1990-08-14 1995-08-08 Digital Equipment Corporation Methods and apparatus for implementing server functions in a distributed heterogeneous environment
US5341478A (en) 1990-08-14 1994-08-23 Digital Equipment Corporation Methods and apparatus for providing dynamic invocation of applications in a distributed heterogeneous environment
US5317686A (en) 1990-09-10 1994-05-31 Lotus Development Corporation Data processing apparatus and method for a reformattable multidimensional spreadsheet
US5237680A (en) 1990-09-27 1993-08-17 Sun Microsystems, Inc. Method for incremental rename propagation between hierarchical file name spaces
US5297249A (en) 1990-10-31 1994-03-22 International Business Machines Corporation Hypermedia link marker abstract and search services
US5204947A (en) 1990-10-31 1993-04-20 International Business Machines Corporation Application independent (open) hypermedia enablement services
US5745712A (en) 1990-10-31 1998-04-28 Borland International, Inc. Graphical programming system and methods for assisting a user with creating screen objects on a screen device
US5379419A (en) 1990-12-07 1995-01-03 Digital Equipment Corporation Methods and apparatus for accesssing non-relational data files using relational queries
US5410646A (en) 1991-01-31 1995-04-25 Park City Group, Inc. System and method for creating, processing, and storing forms electronically
US5191645A (en) 1991-02-28 1993-03-02 Sony Corporation Of America Digital signal processing system employing icon displays
US5187786A (en) 1991-04-05 1993-02-16 Sun Microsystems, Inc. Method for apparatus for implementing a class hierarchy of objects in a hierarchical file system
US5339424A (en) 1991-04-19 1994-08-16 Mitsubishi Denki Kabushiki Kaisha System and method for compiling and executing a computer program written in more than one programming language
US5274803A (en) 1991-04-26 1993-12-28 Sun Microsystems, Inc. Method and apparatus for aligning a restored parent environment to its child environments with minimal data loss
US5517655A (en) 1991-04-26 1996-05-14 Hewlett-Packard Company Method for monitoring transactions in an object-oriented environment
US5313631A (en) 1991-05-21 1994-05-17 Hewlett-Packard Company Dual threshold system for immediate or delayed scheduled migration of computer data files
US5481722A (en) 1991-08-19 1996-01-02 Sun Microsystems, Inc. Method and apparatus for merging change control delta structure files of a source module from a parent and a child development environment
US5566330A (en) 1991-08-20 1996-10-15 Powersoft Corporation Method for forming a reusable and modifiable database interface object
US5377323A (en) 1991-09-13 1994-12-27 Sun Microsytems, Inc. Apparatus and method for a federated naming system which can resolve a composite name composed of names from any number of disparate naming systems
US5717939A (en) 1991-11-18 1998-02-10 Compaq Computer Corporation Method and apparatus for entering and manipulating spreadsheet cell data
US5640544A (en) 1991-12-28 1997-06-17 Nec Corporation Computer network having an asynchronous document data management system
US5371675A (en) 1992-06-03 1994-12-06 Lotus Development Corporation Spreadsheet program which implements alternative range references
US5740439A (en) 1992-07-06 1998-04-14 Microsoft Corporation Method and system for referring to and binding to objects using identifier objects
US5581760A (en) 1992-07-06 1996-12-03 Microsoft Corporation Method and system for referring to and binding to objects using identifier objects
US5664178A (en) 1992-07-06 1997-09-02 Microsoft Corporation Method and system for organizing internal structure of a file
US5682536A (en) 1992-07-06 1997-10-28 Microsoft Corporation Method and system for referring to and binding to objects using identifier objects
US5689703A (en) 1992-07-06 1997-11-18 Microsoft Corporation Method and system for referring to and binding to objects using identifier objects
US5434975A (en) 1992-09-24 1995-07-18 At&T Corp. System for interconnecting a synchronous path having semaphores and an asynchronous path having message queuing for interprocess communications
US5438659A (en) 1992-10-08 1995-08-01 Hewlett-Packard Company Object-action user interface management system
US5748807A (en) 1992-10-09 1998-05-05 Panasonic Technologies, Inc. Method and means for enhancing optical character recognition of printed documents
US5412772A (en) 1992-10-13 1995-05-02 Novell, Inc. System for permitting a view of an object or a user interface to be exchanged between operating system environments
US5396623A (en) 1992-10-30 1995-03-07 Bmc Software Inc. Method for editing the contents of a DB2 table using an editproc manager
US5600789A (en) 1992-11-19 1997-02-04 Segue Software, Inc. Automated GUI interface testing
US5581686A (en) 1992-12-01 1996-12-03 Microsoft Corporation Method and system for in-place interaction with contained objects
US5550976A (en) 1992-12-08 1996-08-27 Sun Hydraulics Corporation Decentralized distributed asynchronous object oriented system and method for electronic data management, storage, and communication
US5455875A (en) 1992-12-15 1995-10-03 International Business Machines Corporation System and method for correction of optical character recognition with display of image segments according to character data
US5390325A (en) 1992-12-23 1995-02-14 Taligent, Inc. Automated testing system
US5572648A (en) 1993-01-19 1996-11-05 Canon Kabushiki Kaisha System for simultaneously displaying a static tool palette having predefined windowing tool functions and a dynamic tool palette which changes windowing tool functons in accordance with a context of an executed application program
US5535389A (en) 1993-01-26 1996-07-09 International Business Machines Corporation Business process objects with associated attributes such as version identifier
US5602996A (en) 1993-01-27 1997-02-11 Apple Computer, Inc. Method and apparatus for determining window order when one of multiple displayed windows is selected
US5446842A (en) 1993-02-26 1995-08-29 Taligent, Inc. Object-oriented collaboration system
US5436637A (en) 1993-03-05 1995-07-25 Borland International, Inc. Graphical user interface system and methods for improved user feedback
US5608720A (en) 1993-03-09 1997-03-04 Hubbell Incorporated Control system and operations system interface for a network element in an access system
US5369766A (en) 1993-03-25 1994-11-29 Taligent, Inc. Object-oriented loader system with support for different load formats
US5459865A (en) 1993-04-05 1995-10-17 Taligent Inc. Runtime loader
US5408665A (en) 1993-04-30 1995-04-18 Borland International, Inc. System and methods for linking compiled code with extended dictionary support
US5669005A (en) 1993-05-10 1997-09-16 Apple Computer, Inc. System for automatically embedding or incorporating contents added to a document
US5542070A (en) 1993-05-20 1996-07-30 Ag Communication Systems Corporation Method for rapid development of software systems
US5649099A (en) 1993-06-04 1997-07-15 Xerox Corporation Method for delegating access rights through executable access control program without delegating access rights not in a specification to any intermediary nor comprising server security
US5577252A (en) 1993-07-28 1996-11-19 Sun Microsystems, Inc. Methods and apparatus for implementing secure name servers in an object-oriented system
US5555325A (en) 1993-10-22 1996-09-10 Lockheed Martin Federal Systems, Inc. Data capture variable priority method and system for managing varying processing capacities
US5668966A (en) 1994-02-15 1997-09-16 International Business Machines Corporation System and method for direct manipulation of search predicates using a graphical user interface
US5704029A (en) 1994-05-23 1997-12-30 Wright Strategies, Inc. System and method for completing an electronic form
US5504898A (en) 1994-06-20 1996-04-02 Candle Distributed Solutions, Inc. Threaded environment for AS/400
US5627979A (en) 1994-07-18 1997-05-06 International Business Machines Corporation System and method for providing a graphical user interface for mapping and accessing objects in data stores
US5630126A (en) 1994-12-13 1997-05-13 International Business Machines Corp. Systems and methods for integrating computations into compound documents
US5625783A (en) 1994-12-13 1997-04-29 Microsoft Corporation Automated system and method for dynamic menu construction in a graphical user interface
US6367013B1 (en) * 1995-01-17 2002-04-02 Eoriginal Inc. System and method for electronic transmission, storage, and retrieval of authenticated electronic original documents
US5706501A (en) 1995-02-23 1998-01-06 Fuji Xerox Co., Ltd. Apparatus and method for managing resources in a network combining operations with name resolution functions
US5758184A (en) 1995-04-24 1998-05-26 Microsoft Corporation System for performing asynchronous file operations requested by runnable threads by processing completion messages with different queue thread and checking for completion by runnable threads
US5634121A (en) 1995-05-30 1997-05-27 Lockheed Martin Corporation System for identifying and linking domain information using a parsing process to identify keywords and phrases
US5689667A (en) 1995-06-06 1997-11-18 Silicon Graphics, Inc. Methods and system of controlling menus with radial and linear portions
US5745683A (en) 1995-07-05 1998-04-28 Sun Microsystems, Inc. System and method for allowing disparate naming service providers to dynamically join a naming federation
US5644738A (en) 1995-09-13 1997-07-01 Hewlett-Packard Company System and method using context identifiers for menu customization in a window
US5572643A (en) 1995-10-19 1996-11-05 Judson; David H. Web browser with dynamic display of information objects during linking
US5742504A (en) 1995-11-06 1998-04-21 Medar, Inc. Method and system for quickly developing application software for use in a machine vision system
US5659729A (en) 1996-02-01 1997-08-19 Sun Microsystems, Inc. Method and system for implementing hypertext scroll attributes
US5721824A (en) 1996-04-19 1998-02-24 Sun Microsystems, Inc. Multiple-package installation with package dependencies
US6307955B1 (en) * 1998-12-18 2001-10-23 Topaz Systems, Inc. Electronic signature management system
US20050132196A1 (en) * 2003-12-16 2005-06-16 Josef Dietl Electronic signatures

Non-Patent Citations (99)

* Cited by examiner, † Cited by third party
Title
"A Proposal on Digital Watermark in Document Image Communication and Its Application to Realizing a Signature" Electronics and Communications in Japan Part I: Communications vol. 73 No. 5 May 1990 pp. 22-33.
"A robust and secure media signature scheme for JPEG images" Proceedings of 2002 IEEE Workshop on Multimedia Signal Processing Dec. 2002 pp. 296-299.
"Architecture for a Dynamic Information Area Control" IBM Technical Disclosure Bulletin IBM Corp. New York US vol. 37 No. 10 Jan. 10, 1994. pp. 245-246.
"Delphi 5 Developer's Guide" Sams Publishing 1999 Chapter 31 Section: Data Streaming 6 pages.
"From small beginnings" Knowledge Management Nov. 2001 pp. 28-30.
"Micro-Firewalls for Dynamic Network Security with Distributed Intrusion Detection"; IEEE INternational Symposium on Network Computing and Applications; 2001; pp. 68-79.
"Microsoft Visual Basic 5.0 Programmer's Guide 1997"; pp. 578-579; Redmond WA 98052-6399.
"Microsoft Word 2000 Screenshots", (2000), 11-17.
"Microsoft Word 2000 Screenshots", Word,(2000),1-17.
"Netscape window" Netscape Screenshot Oct. 2, 2002, 1 page.
"Protection Data from Malicious Software"; 18th Annual Computer Security Applications Conference; 2002; pp. 199-208.
"Sandboxing Applications"; Proceedings of the FREENIX Track; 2001; pp. 119-126.
"Specifying Runtime Environments and Functionalities of Downloadable Components Under the Sandbox Mode"; International Symposium on Principles of Software Evolution; 2000; pp. 138-142.
"Store and Organize Related Project Files in a Binder," Getting Results with Microsoft Office, 1990, pp. 109-112.
"Webopedia Computer Dictionary" retrieved on May 9, 2006, at <<http://www.pewebopedia.com/TERM/O/OLE.html>>, Jupitermedia Corporation, 2006, pp. 07.
"Whitehill Composer" Whitehill Technologies Inc. 2 pages.
Alschuler Liora "A tour of Xmetal" O'Reilly XML.COM 'Online Jul. 14, 1999 XP002230081 retrieved from the internet: <URL:http://www.xml.com/pub/a/SeyboldReport/ip0311025.html> retrieved on Feb. 5, 2003.
Altova et al. XML Spy, XML integrated Development Environments, Altova Inc., 2002, pp. 1-18.
Altova, "Altova Tools for XPath 1.0/2.0", Altova,1-12.
Altova, Inc., "XML Spy 4.0 Manual," Altova Inc. & Altova GmbH, copyright 1998-2001, Chapters 1,2, and 6, encompassing pp. 1-17, 18-90, and 343-362.
Applicant's Statement Regarding a Non-Public Use.
Atova, "User Reference manual Version 4.4, XML Spy suite 4.4," Atova Ges.m.b.H and Altova, Inc., May 24, 2002, pages cover, copyright p. 1-565.
Au Irene et al. "Netscape Communicator's Collapsible Toolbars" CHI'98 Human Factors in Computing Systems Conference Proceedings Los Angeles CA Apr. 18-23, 1998 pp. 81-86.
Barker et al., "Creating In-Line Objects Within An Integrated Editing Environment," IBM Technical Disclosure Bulletin, vol. 27, No. 5, Oct. 1984, p. 2962.
Battle Steven A. et al.; "Flexible Information Presentation with XML" 1998 The Institution of Electrical Engineers 6 pages.
Beauchemin, Dave "Using InfoPath to Create Smart Forms", Retrieved from the Internet at http:/www.microsoft.com/office/infopath/prodinfo/using.mspx on Jan. 21, 2007,(Mar. 27, 2003).
Begun, Andrew et al., "Support and Troubleshooting for XML Schemas in InfoPath 2003", Microsoft Office InfoPath 2003 Technical Articles, Retrieved from the Internet at http://msdn2.microsoft.com/en-us/library/aa168241(office.11,d=printer).aspx on Jan. 21, 2007,(Aug. 2004).
Ben-Natan, U.S. Appl. No. 60/203,081, filed May 9, 2000, entitled "Internet platform for creating and supporting communities".
Berg A., "Naming and Binding: Monikers" Inside OLE, 1995, Chapter 9, pp. 431-490.
Brogden William; "Arbortext Adept 8 Editor Review" O'Reilly XML.COM 'Online! Sep. 22, 1999 XP002230080 retrieved from the Internet <URL:http://www.xml.com/pub/a/1999/09/adept/AdeptRvw.htm> retrieved on Feb. 5, 2003.
Bruce Halberg et al, "Using Microsoft Excel 97", Published 1997, Bestseller Edition, Pertinent pp. 1-9, 18-25, 85-89, 98-101, 106-113, 124-127, 144-147, 190-201, 209-210, 218-227, 581-290, 632-633, 650-655, 712-714.
Chen Yi et al.: A; "XKvalidator: A Constraint Validator for XML" CIKM '-2 Nov. 4-9, 2002 Copyright 2002 ACM 1-58113-492-4/02/0011 pp. 446-452.
Cheng Ya Bing et al.; "Designing Valid XML Views" ER 2002 LNCS 2503 2002 Springer-Verlag Berlin Heidelberg 2002 pp. 463-477.
Chien Shu-Yao et al. ;Efficient Management of Multiversion Documents by Object Referencing Proceedings of the 27th VLDB Conference 2001 pp. 291-300.
Chien Shu-Yao et al.; "Efficient schemes for managing multiversion XML documents" VLDB Journal (2002) pp. 332-352.
Chien Shu-Yao et al.; "Storing and Querying Multiversion XML Documents using Durable Node Numbers" IEEE 2002 pp. 232-241.
Chien Shu-Yao et al.; "XML Document Versioning" SIGMOD Record vol. 30 No. 3 Sep. 2001 pp. 46-53.
Chuang Tyng-Ruey; "Generic Validation of Structural Content with Parametric Modules" ICFP '01 Sep. 3-5, 2001 Copyright 2001 ACM 1-58113-415-0/01/0009 pp. 98-109.
Ciancarini Paolo et al.; "Managing Complex Documents Over the WWW: A Case Study for XML" IEEE Transactions on Knowledge and Data Engineering Vo.I. 11 No. 4 Jul./Aug. 1999. pp. 629-938.
Clapp D., "The NeXT Application Kit Part I: Non-Responsive Classes," The NeXT Bible 1990, Chapter 16, pp. 275-293.
Clark James-W3C Editor; "XSL Transformation (XSLT) Verison 1.0" Nov. 16, 1999 W3C (MIT INRIA Kejo) pp. 1-156.
Cover, XML Forms Architecture, retrieved at << http://xml.coverpages.org/xfa.html>> on Aug. 17, 2006, Coverpages, Jun. 16, 1999.
Cybook, Inc.: "Copying the Search Form to Services-based Web Sites" INternet Article, (online) Jul. 26, 2004.the whole document.
Davidow Ari: Alle; "XML Editors: Allegations of Functionality in search of reality" Internet 'Online! 1999 XP002230082 retrieved from the Internet <URL:http://www.ivritype.com/xml/>.
Dayton Linnea and Jack Davis; "Photo Shop 5/5.5 Wow! Book" 2000 Peachpit Press pp. 8-17.
Description of Whitehill Composer software product producted by Whitehill Technologies Inc. available at <http://www.xml.com/pub/p/221> accessed on Apr. 8, 2004 two pages.
DiLascia et al., "Sweeper" Microsoft Interactive Developer, vol. 1, No. 1, 1996, 27 pages.
Dodds, "Toward an XPath API", xml.com,(May 7, 2001),1-3.
Dyck Timothy; "XML Spy Tops as XML Editor" http://www.eweek.com/article2/0395972404100.asp Nov. 25, 2002 4 pages.
Excel Developer Tip (hereinafter "Excel"), "Determining the Data Type of a Cell", May 13, 1998, p. 1 (available at http://jwalk.com/ss//excel/tips/tip62.htm).
Hall Richard Scott; "Agent-based Software Configuration and Deployment" Thesis of the University of Colorado Online Dec. 31, 1999 retrieved from the Internet on Nov. 7, 2003: <http://www.cs.colorado.edu/users/rickhall/documents/ThesisFinal.pdf> 169 pages.
Han et al., WebSplitter: A Unified XML Framework for Multi-Device Collaborative Web Browsing, 2000, ACM Conference on Cimputer Supported Cooperative Work, 10 pages.
Hardy Mathew R. B. et al; "Mapping and Displaying Structural Transformations between XML and PDF" DocEng '02 Nov. 8-9, 2002 Copyright 2002 ACM 1-58113-597-7/02/0011 pp. 95-102.
Haukeland Jan-Henrick; "Tsbiff-tildeslash biff-version 1.2.1" Internet Document [Online] Jun. 1999 URL: http://web.archive.org/web/19990912001527/http://www.tildeslash.com/tsbiff/.
Herzner et al., "CDAM-Compound Document Access and Management, An Object-Oriented Approach" Multimedia Systems Interaction and Applications, 1992, Chapter 3, pp. 17-36.
IBM: Stack Algorithm for Extractin Subtree from Serialized Tree, Mar. 1, 1994, TDB-ACC-NONN94033, 3 pages.
Ixia Soft, "Steamlining content creation, retrieval, and publishing on the Web using TEXTML Server and SML Spy 4 Suite in an integrated, Web publishing environment," (Partner's Whitepaper, published on the Web as of Jun. 6, 2002, downlowad pp. 1-16.
Kanemoto Hirotaka et al; "An Efficiently Updatable Index Scheme for Structured Documents" 1998 IEEE pp. 991-996.
Kim Sang-Kyun et al.; "Immediate and Partial Validation Mechanism for the Conflict Resolution of Update Operations in XML Databases" WAIM 2002 LNCS 2419 2002 pp. 387-396 Springer-Verlag Berlin Heidelberg 2002.
Kobayashi et al., "An Update on BTRON-specification OS Development" IEEE 1991 pp. 132-140.
Kutay, U.S. Appl. No. 60/209,713, filed Jun. 5, 2000, entitled, "Methods and systems for accessing, organizing presenting and viewing data".
Laura Acklen & Read Gilgen, "Using Corel Wordperfect 9", 251-284, 424-434, 583-586 (1998).
LeBlond et al, "PC Magazine Guide to Quattro Pro for Windows", pp. 9-11, 42-61, Ziff-Davis Press, Copyright 1993 by the LeBlond Group.
Macromedia, Inc.: "Dreamweaver Technote, Changes in copying and pasting in Dreamweaver 4" Internet Article (online).the whole document.
Mansfield, "Excel 97 for Busy People", Published by Osborne/Mcgraw-Hill 1997 pp. 48-50.
McCright J.S.; "New Tool Kit to Link Groove with Microsoft Sharepoint" eWeek Enterprise News & Reviews Ziff Davis Media INc. Jul. 29, 2002 1 page.
Microsoft Corporation, "Microsoft Computer Dictionary" Microsoft Press, Fifth Edition, p. 149.
Microsoft Word 2000 (see Screen Shot "About Microsoft Word") Published 1983-1999 and Microsoft Excel 2000 (see Screen Shot "About Microsoft Excel") Published 1988-1999, Three pages.
Moore, U.S. Appl. No. 60/191,662, filed Mar. 23, 2000, entitled "Collection-based presistent digital archives".
Musgrave S; "Networking technology-impact and opportunities" Survey and Statistical Computing 1996. Proceedings of the Second ASC International Conference. Sep. 1996. pp. 369-378. London UK.
Nelson Mark; "Validation with MSXML and XML Schema" Windows Developer Magazine Jan. 2002 pp. 35-38.
Netscape Communication Corp; "SmartUpdate Developer's Guide" Online Mar. 11, 1999 retrieved from the Internet on Dec. 8, 2000: <http://developer.netscape.com:80/docs/manuals/communicator/jarman/index.htm> 83 pages.
Netscape Communication Corpora; "Netscape Communicator 4.61 for OS/2 Warp" Software 1999 The whole software release & "Netscape-Version 4.6 [en]-010615" Netscape Screenhot Oct. 2, 2002.
Noore A.; "A secure conditional access system using digital signature and encryption" 2003 Digest of Technical Papers. International Conference on Consumer Electronics Jun. 2003 pp. 220-221.
OMG XML Metadata Interchange (XMI) Specification Version 1.2 Jan. 2002.
Pacheco, Xavier et al., "Delphi 5 Developer's Guide", Sams Publishing, Chapter 31, Section: Data Streaming,(1999),4.
Peterson B. , "Unix Variants," Unix Review, vol. 10, No. 4, Apr. 1992, pp. 29-31.
Pike et al., "Plan 9 from Bell Labs" UKUUG, Summer 1990, 10 pages.
Pike et al., "The Use of Name Spaces in Plan 9," Operating Systems Review vol. 27, No. 2, Apr. 1993, pp. 72-76.
Rado, Dave: "How to create a template that makes it easy for users to "fill in the blanks", without doing any programming" Microsoft Word MVP FAQ Site, (online) Apr. 30, 2004, the whole document.
Raggett, "HTML Tables", retrieved on Aug. 6, 2006, at <<http:www://is-edu.hcmuns.edu.vn/WebLib/books/Web/Tel/html3-tables.html>>, W3C Internet Draft, Jul. 7, 1995, pp. 1-12.
Rapaport L; "Get more from SharePoint" Transform Magazine vol. 11 No. 3. Mar. 2002 pp. 1315.
Rogge Bories et al.; "Validating MPEG-21 Encapsulated Functional Metadata" IEEE 2002 pp. 209-212.
Staneck W., "Internal and External Media" Electronic Publishing Unleashed, 1995, Chapter 22, pp. 510-542.
StylusStudio, "StylusStudio: XPath Tools", 2004-2007, StylusStudio,1-14.
Sutanthavibul Supoj et al.; "XFIG Version 3.2 Patchlevel 2 (Jul. 2, 1998) Users Manual (Edition 1.0)" Internet Document [Online] Jul. 2, 1998 XP002229137 Retrieved from the Internet: <URL:http://www.ice.mtu.edu/online-docs/xfig332/> [retrieved on Jan. 28, 2003].
Tomimori et al.; "An Efficient and Flexible Access Control Framework for Java Programs in Mobile Terminals"; 22nd International Conference on Distributed Computing Systems Workshops; 2002; pp. 777-782.
Trupin J., "The Visual Programmer," Microsoft Systems Journal, Apr. 1996, pp. 103-105.
U.S. Appl. No. 60/191,662, Kutay et al.
U.S. Appl. No. 60/203,081, Ben-Natan et al.
U.S. Appl. No. 60/209,713, filed Jan. 1, 1900, Kutay et al.
Usdin Tommie et al.; Not a; "XML: Not a Silver Bullet But a Great Pipe Wrench" Standardview vol. 6, No. 3 Sep. 1998 pp. 125-132.
Van Hoff Arthur et al.; "The Open Software Description Format" Online Aug. 13, 1997 retrieved from the Internet on Nov. 7, 2003: <http://www.w3.org/TR/NOTE-OSD> 11 pages.
Verlamis Iraklis et al.; "Bridging XML-Schema and relational databases. A System for generating and manipulating relational databases using valid XML documents." DocEng '01 Nov. 9-10, 2001 Coppyright 2001 ACM 1-58113-432-0/01/0011 pp. 105-114.
W3C Editor James Calrk and Ste; "XML Path Language (XPath) Version 1.0" Nov. 16, 1999W3C (MIT INRIA Kejo) pp. 1-49.
Williams Sara and Charlie Kin; "The Component Object Model A Technical Overview" Oct. 1994 Microsoft Corp. pp. 1-14.
Wong Raymond K. et al.; "Managing and Querying Multi-Version XML Data with Update Logging" DocEng '02 Nov. 8-9, 2002 Copyright 2002 ACM 1-58113-594-7/02/0011 pp. 74-81.
XMLSpy, "XmlSpy 2004 Enterprise Edition Manual", Altova,(May 17, 2004),1-25, 220-225.
Zdonik S., "Object Management System Concepts," ACM, 1984, pp. 13-19.

Cited By (58)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8074217B2 (en) 2000-06-21 2011-12-06 Microsoft Corporation Methods and systems for delivering software
US7979856B2 (en) 2000-06-21 2011-07-12 Microsoft Corporation Network-based software extensions
US7925621B2 (en) 2003-03-24 2011-04-12 Microsoft Corporation Installing a solution
US8918729B2 (en) 2003-03-24 2014-12-23 Microsoft Corporation Designing electronic forms
US8117552B2 (en) 2003-03-24 2012-02-14 Microsoft Corporation Incrementally designing electronic forms and hierarchical schemas
US9229917B2 (en) 2003-03-28 2016-01-05 Microsoft Technology Licensing, Llc Electronic form user interfaces
US8892993B2 (en) 2003-08-01 2014-11-18 Microsoft Corporation Translation file
US9239821B2 (en) 2003-08-01 2016-01-19 Microsoft Technology Licensing, Llc Translation file
US9268760B2 (en) 2003-08-06 2016-02-23 Microsoft Technology Licensing, Llc Correlation, association, or correspondence of electronic forms
US8429522B2 (en) 2003-08-06 2013-04-23 Microsoft Corporation Correlation, association, or correspondence of electronic forms
US7971139B2 (en) 2003-08-06 2011-06-28 Microsoft Corporation Correlation, association, or correspondence of electronic forms
US20100201182A1 (en) * 2005-01-14 2010-08-12 Michael John Gottschalk Continuous radius axle and fabricated spindle assembly
US7937651B2 (en) 2005-01-14 2011-05-03 Microsoft Corporation Structural editing operations for network forms
US8010515B2 (en) 2005-04-15 2011-08-30 Microsoft Corporation Query to an electronic form
US8200975B2 (en) 2005-06-29 2012-06-12 Microsoft Corporation Digital signatures for network forms
US9292480B2 (en) * 2005-07-06 2016-03-22 Encomia, L.P. Method for displaying and printing different sizes of SMART Docs
US20070011457A1 (en) * 2005-07-06 2007-01-11 Encomia, L.P. Method for displaying and printing different sizes of SMART Docs
US8001459B2 (en) 2005-12-05 2011-08-16 Microsoft Corporation Enabling electronic documents for limited-capability computing devices
US9210234B2 (en) 2005-12-05 2015-12-08 Microsoft Technology Licensing, Llc Enabling electronic documents for limited-capability computing devices
US20090132814A1 (en) * 2006-08-04 2009-05-21 Fujitsu Limited Program, method and apparatus for managing electronic documents
US8671280B2 (en) * 2006-08-04 2014-03-11 Fujitsu Limited Program, method and apparatus for managing electronic documents
US20080097777A1 (en) * 2006-10-23 2008-04-24 Ctm Software Corporation Electronic document execution
US9514117B2 (en) 2007-02-28 2016-12-06 Docusign, Inc. System and method for document tagging templates
US8949706B2 (en) 2007-07-18 2015-02-03 Docusign, Inc. Systems and methods for distributed electronic signature documents
US8655961B2 (en) 2007-07-18 2014-02-18 Docusign, Inc. Systems and methods for distributed electronic signature documents
US10198418B2 (en) 2007-07-18 2019-02-05 Docusign, Inc. Systems and methods for distributed electronic signature documents
US9634975B2 (en) 2007-07-18 2017-04-25 Docusign, Inc. Systems and methods for distributed electronic signature documents
US20090024912A1 (en) * 2007-07-18 2009-01-22 Docusign, Inc. Systems and methods for distributed electronic signature documents
US20090292786A1 (en) * 2007-07-18 2009-11-26 Docusign, Inc. Systems and methods for distributed electronic signature documents
US20090313743A1 (en) * 2008-06-20 2009-12-24 Craig Jason Hofmeyer Pants with saggy pants control system
US9251286B2 (en) * 2008-07-15 2016-02-02 International Business Machines Corporation Form attachment metadata generation
US20100017426A1 (en) * 2008-07-15 2010-01-21 International Business Machines Corporation Form Attachment Metadata Generation
US20100157365A1 (en) * 2008-12-24 2010-06-24 Samsung Electronics Co., Ltd Method to generate digital signature, print controlling terminal, and image forming apparatus
US20100287260A1 (en) * 2009-03-13 2010-11-11 Docusign, Inc. Systems and methods for document management transformation and security
US8239496B2 (en) 2009-03-13 2012-08-07 Docusign, Inc. Systems and methods for document management transformation and security
US9798710B2 (en) 2010-05-04 2017-10-24 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
US9251131B2 (en) 2010-05-04 2016-02-02 Docusign, Inc. Systems and methods for distributed electronic signature documents including version control
US8949708B2 (en) 2010-06-11 2015-02-03 Docusign, Inc. Web-based electronically signed documents
US9824198B2 (en) 2011-07-14 2017-11-21 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9971754B2 (en) 2011-07-14 2018-05-15 Docusign, Inc. Method for associating third party content with online document signing
US11790061B2 (en) 2011-07-14 2023-10-17 Docusign, Inc. System and method for identity and reputation score based on transaction history
US11263299B2 (en) 2011-07-14 2022-03-01 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9628462B2 (en) 2011-07-14 2017-04-18 Docusign, Inc. Online signature identity and verification in community
US11055387B2 (en) 2011-07-14 2021-07-06 Docusign, Inc. System and method for identity and reputation score based on transaction history
US9268758B2 (en) 2011-07-14 2016-02-23 Docusign, Inc. Method for associating third party content with online document signing
US10430570B2 (en) 2011-07-14 2019-10-01 Docusign, Inc. System and method for identity and reputation score based on transaction history
US10511732B2 (en) 2011-08-25 2019-12-17 Docusign, Inc. Mobile solution for importing and signing third-party electronic signature documents
US10033533B2 (en) 2011-08-25 2018-07-24 Docusign, Inc. Mobile solution for signing and retaining third-party documents
US20130097493A1 (en) * 2011-10-17 2013-04-18 International Business Machines Corporation Managing Digital Signatures
US8793499B2 (en) 2012-01-20 2014-07-29 Lockheed Martin Corporation Nested digital signatures with constant file size
US9893895B2 (en) 2012-03-22 2018-02-13 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US9230130B2 (en) 2012-03-22 2016-01-05 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
USRE49119E1 (en) 2012-03-22 2022-06-28 Docusign, Inc. System and method for rules-based control of custody of electronic signature transactions
US20140007221A1 (en) * 2012-06-29 2014-01-02 Jasmeet Chhabra Secure image authentication
US9185081B2 (en) * 2012-10-22 2015-11-10 Symantec Corporation Format friendly encryption
US9565188B2 (en) 2013-10-17 2017-02-07 Scrypt, Inc System and method for digitally signing documents from a mobile device
US20210286938A1 (en) * 2015-01-30 2021-09-16 Docusign, Inc. Systems and Methods for Obtaining an Electronic Signature Via a Word Processing Application
US11755823B2 (en) * 2015-01-30 2023-09-12 Docusign, Inc. Systems and methods for obtaining an electronic signature via a word processing application

Also Published As

Publication number Publication date
US7533268B1 (en) 2009-05-12

Similar Documents

Publication Publication Date Title
US7568101B1 (en) Digital signatures with an embedded view
US8200975B2 (en) Digital signatures for network forms
US7774608B2 (en) Author signatures for legal purposes
US20040250070A1 (en) Authentication of electronic documents
US8091015B2 (en) Digital document management system, digital document management method, and digital document management program
US7353397B1 (en) Repurposing digitally signed information
US20010034835A1 (en) Applied digital and physical signatures over telecommunications media
EP1548610A2 (en) Systems and methods for user-specific document change highlighting
US20070168671A1 (en) Digital document management system, digital document management method, and digital document management program
JP3853528B2 (en) Authentication management system and authentication management method
US9727660B2 (en) System and method to aid assistive software in dynamically interpreting internet websites and the like
JP4093723B2 (en) Electronic signature method and apparatus for structured document
US20140032912A1 (en) Trust context for document signatures
JP2008527937A (en) Method and apparatus for adding signature information to an electronic document
WO2000046681A9 (en) Content certification
US7586641B2 (en) System for certifying whether printed material corresponds to original
JP2003281333A (en) System, method and program for electronic signature, and recording medium having the program recorded thereon
JP2004248045A (en) Electronic signature system and its program
EP1883035A2 (en) Electronic data disclosure method and system
US20130036306A1 (en) Method and system for handling defined areas within an electronic document
KR101417825B1 (en) Method of verification of electronic filing document and apparatuse for using the same
WO2021158778A1 (en) Systems and methods for encoding executable code in barcodes
Scheibelhofer What You See Is What You Sign: Trustworthy Display of XML Documents for Signing and Verification
EP1116110B1 (en) Method of creating an inseparable link between an electronic document and ole objects
US8543901B1 (en) Verification of content stored in a network

Legal Events

Date Code Title Description
AS Assignment

Owner name: MICROSOFT CORPORATION, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:CATORCINI, ALESSANDRO;NARENDRAN, ARUNGUNDRAM;VAN VELZEN, DANNY;AND OTHERS;REEL/FRAME:015339/0818;SIGNING DATES FROM 20040421 TO 20040505

STCF Information on status: patent grant

Free format text: PATENTED CASE

FPAY Fee payment

Year of fee payment: 4

AS Assignment

Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034541/0477

Effective date: 20141014

FPAY Fee payment

Year of fee payment: 8

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 12